Gentoo: pine address buffer overflow vulnerability

    Date02 Dec 2002
    CategoryGentoo
    6429
    Posted ByLinuxSecurity Advisories
    While parsing and escaping characters of eMail addresses pine does not allocate enough memory for storing the escaped mailbox part of an address.
    
    - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200212-1
    - --------------------------------------------------------------------
    
    PACKAGE : pine
    SUMMARY : remote DOS
    DATE    : 2002-12-02 13:12 UTC
    EXPLOIT : remote
    
    - --------------------------------------------------------------------
    
    An attacker can send a fully legal email message with a crafted
    From-header and thus forcing pine to core dump on startup.
    The only way to launch pine is manually removing the bad message
    either directly from the spool, or from another MUA. Until the
    message has been removed or edited there is no way of accessing
    the INBOX using pine.
    
    Read the full advisory at 
    http://marc.theaimsgroup.com/?l=bugtraq&m=103668430620531&w=2
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-mail/pine-4.44-r5 and earlier update their systems as follows:
    
    emerge rsync
    emerge pine
    emerge clean
    
    - --------------------------------------------------------------------
    This email address is being protected from spambots. You need JavaScript enabled to view it. - GnuPG key is available at www.gentoo.org/~aliz
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    - --------------------------------------------------------------------
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.