Vulnerability Name:

CVE-2005-1520 (CCN-20722)

Assigned:2005-05-25
Published:2005-05-25
Updated:2008-09-05
Summary:Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a crafted e-mail.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-1520

Source: CCN
Type: freshmeat.net Web site
GNU Mailutils - Default branch

Source: CCN
Type: SA15442
Mailutils Four Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
15442

Source: CCN
Type: SECTRACK ID: 1014052
GNU Mailutils Buffer Overflow and Format String Bugs Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1014052

Source: DEBIAN
Type: UNKNOWN
DSA-732

Source: DEBIAN
Type: DSA-732
mailutils -- several vulnerabilities

Source: CCN
Type: GLSA-200505-20
Mailutils: Multiple vulnerabilities in imap4d and mail

Source: CCN
Type: GNU Mailutils Web page
GNU Mailutils

Source: CCN
Type: iDEFENSE Security Advisory 05.25.05
GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability

Source: IDEFENSE
Type: Patch
20050525 GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability

Source: CCN
Type: OSVDB ID: 16854
GNU Mailutils Mail header_get_field_name() Function Remote Overflow

Source: BID
Type: Patch
13766

Source: CCN
Type: BID-13766
GNU Mailutils Mail Email Header Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
gnu-mailutils-headergetfield-bo(20722)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:mailutils:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:mailutils:0.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:mailutils:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:mailutils:0.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:732
    V
    several vulnerabilities
    2005-06-03
    BACK
    gnu mailutils 0.5
    gnu mailutils 0.6
    gnu mailutils 0.5
    gnu mailutils 0.6
    debian debian linux 3.0
    gentoo linux *