Vulnerability Name:

CVE-2002-0198 (CCN-7983)

Assigned:2002-01-22
Published:2002-01-22
Updated:2016-10-18
Summary:Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Tue Jan 22 2002 - 14:33:16 CST
pldaniels - ripMime 1.2.6 and lower?

Source: MITRE
Type: CNA
CVE-2002-0198

Source: BUGTRAQ
Type: UNKNOWN
20020122 pldaniels - ripMime 1.2.6 and lower?

Source: CCN
Type: ripMIME Web site
Welcome to ripMIME.

Source: CONFIRM
Type: UNKNOWN
http://pldaniels.org/ripmime/CHANGELOG

Source: XF
Type: Patch, Vendor Advisory
ripmime-long-filename-bo(7983)

Source: CCN
Type: OSVDB ID: 8340
ripMIME Long File Name Overflow

Source: BID
Type: UNKNOWN
3941

Source: CCN
Type: BID-3941
RipMime Mime_Header Long Filename Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
ripmime-long-filename-bo(7983)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:paul_l_daniels:inflex:1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    paul_l_daniels inflex 1.0.10
    paul_l_daniels ripmime 1.2.0
    paul_l_daniels ripmime 1.2.1
    paul_l_daniels ripmime 1.2.2
    paul_l_daniels ripmime 1.2.3
    paul_l_daniels ripmime 1.2.4
    paul_l_daniels ripmime 1.2.5
    paul_l_daniels ripmime 1.2.6