This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Pine packages that resolve remotely exploitable security
issues are now available.
Pine, developed at the University of Washington, is a tool for
reading, sending, and managing electronic messages (including mail and
A buffer overflow exists in the way unpatched versions of Pine prior
to 4.57 handle the 'message/external-body' type. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2003-0720 to this issue.
An integer overflow exists in the Pine MIME header parsing in versions
prior to 4.57. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0721 to this issue.
Both of these flaws could be exploited by a remote attacker sending a
carefully crafted email to the victim that will execute arbitrary code
when the email is opened using Pine.
All users of Pine are advised to upgrade to these erratum packages,
which contain a backported security patch correcting these issues.
Red Hat would like to thank iDefense for bringing these issues to our
attention and the University of Washington for the patch.
See also :
Update the affected pine package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12420 ()
CVE ID: CVE-2003-0720CVE-2003-0721
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.