RHEL 2.1 : metamail (RHSA-2006:0217)

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated metamail package that fixes a buffer overflow vulnerability
for Red Hat Enterprise Linux 2.1 is now available.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

Metamail is a system for handling multimedia mail.

A buffer overflow bug was found in the way Metamail processes certain
mail messages. An attacker could create a carefully-crafted message
such that when it is opened by a victim and parsed through Metamail,
it runs arbitrary code as the victim. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CVE-2006-0709 to
this issue.

Users of Metamail should upgrade to this updated package, which
contains a backported patch that is not vulnerable to this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2006-0709.html
http://rhn.redhat.com/errata/RHSA-2006-0217.html

Solution :

Update the affected metamail package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.8
(CVSS2#E:POC/RL:U/RC:ND)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 20966 ()

Bugtraq ID: 16611

CVE ID: CVE-2006-0709

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial