Description: | Description:
The remote host is missing updates announced in advisory CLA-2003:630.
Balsa is a GNOME email client. It includes code from mutt, wich is a text-mode email client.
An update[1] for mutt with a fix for a buffer overflow vulnerability[2] (CVE-2003-0140) in the code that handles IMAP folders was released in March 14th, 2003.
Balsa 1.2 incorporates the same code from mutt and is vulnerable as well. An attacker who is able to control an IMAP server accessed by Balsa can exploit this vulnerability to remotely crash the client or execute arbitrary code with the privileges of the user running it. This update fixes this vulnerability.
This announcement also includes a fix for a buffer oveflow vulnerability found in libesmtp, a library used by Balsa to handle SMTP conversations. An attacker able to control an SMTP server can exploit this vulnerability by sending specially crafted responses to a client that uses libesmtp. These messages can crash the client or execute arbitrary code in its context.
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2002-1090 to this issue[3].
Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade'
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0140 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1090 http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8282 http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8281 http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:630 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003
Risk factor : High
CVSS Score: 7.5
|