This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Ulf HÃ¤rnhammar discovered a number of vulnerabilities in emil, a
filter for converting Internet mail messages. The vulnerabilities fall
into two categories :
Buffer overflows in (1) the encode_mime function, (2)
the encode_uuencode function, (3) the decode_uuencode
function. These bugs could allow a carefully crafted
email message to cause the execution of arbitrary code
supplied with the message when it is acted upon by emil.
Format string bugs in statements which print various
error messages. The exploit potential of these bugs has
not been established, and is probably
See also :
For the stable distribution (woody) these problems have been fixed in
We recommend that you update your emil package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false