Vulnerability Name:

CVE-2000-0196 (CCN-4051)

Assigned:2000-02-28
Published:2000-02-28
Updated:2008-09-10
Summary:Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:07
mh/nmh/ja-mh/exmh/exmh2/ja-exmh2 ports allow remote execution of binary code

Source: MITRE
Type: CNA
CVE-2000-0196

Source: CCN
Type: TurboLinux Security Announcement TLSA2000008-01
nmh-1.0.2 and earlier

Source: CCN
Type: RHSA-2000:006-01
New nmh packages available

Source: CCN
Type: CIAC Information Bulletin K-028
FreeBSD Port Exploits for mh/nmh, Lynx, and mtr

Source: DEBIAN
Type: Debian Security Advisory 20000229
nmh: remote exploit in nmh

Source: CCN
Type: OSVDB ID: 1237
nmh Buffer Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2000:006

Source: BID
Type: UNKNOWN
1018

Source: CCN
Type: BID-1018
nmh Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
nmh-execute-code(4051)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nmh:nmh:1.0.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:redhat:linux:5.2:*:alpha:*:*:*:*:*
  • OR cpe:/o:redhat:linux:5.2:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux:5.2:*:sparc:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:alpha:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:alpha:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:sparc:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:debian:debian_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    nmh nmh 1.0.2
    redhat linux 5.2
    redhat linux 5.2
    redhat linux 5.2
    redhat linux 6.0
    redhat linux 6.0
    redhat linux 6.0
    redhat linux 6.1
    redhat linux 6.1
    redhat linux 6.1
    turbolinux turbolinux 3.5b2
    turbolinux turbolinux 4.2
    turbolinux turbolinux 4.4
    turbolinux turbolinux 6.0.2
    debian debian linux 2.1
    redhat linux 6.1
    freebsd freebsd *