This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200403-06
(Multiple remote buffer overflow vulnerabilities in Courier)
The vulnerabilities have been found in the 'SHIFT_JIS' converter in
'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c'. An attacker may
supply Unicode characters that exceed BMP (Basic Multilingual Plane) range,
causing an overflow.
An attacker without privileges may exploit this vulnerability remotely, allowing arbitrary code to be executed in order to gain unauthorized access.
While a workaround is not currently known for this issue, all users are
advised to upgrade to the latest version of the affected packages.
See also :
All users should upgrade to current versions of the affected packages:
# emerge sync
# emerge -pv '>=net-mail/courier-imap-3.0.0'
# emerge '>=net-mail/courier-imap-3.0.0'
# ** Or
depending on your installation... **
# emerge -pv '>=mail-mta/courier-0.45'
# emerge '>=mail-mta/courier-0.45'
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14457 (gentoo_GLSA-200403-06.nasl)
Bugtraq ID: 9845
CVE ID: CVE-2004-0224
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.