Debian DSA-2805-1 : sup-mail - command injection

medium Nessus Plugin ID 71118

Synopsis

The remote Debian host is missing a security-related update.

Description

joernchen of Phenoelit discovered two command injection flaws in Sup, a console-based email client. An attacker might execute arbitrary command if the user opens a maliciously crafted email.

- CVE-2013-4478 Sup wrongly handled the filename of attachments.

- CVE-2013-4479 Sup did not sanitize the content-type of attachments.

Solution

Upgrade the sup-mail packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 0.11-2+nmu1+deb6u1.

For the stable distribution (wheezy), these problems have been fixed in version 0.12.1+git20120407.aaa852f-1+deb7u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728232

https://security-tracker.debian.org/tracker/CVE-2013-4478

https://security-tracker.debian.org/tracker/CVE-2013-4479

https://packages.debian.org/source/squeeze/sup-mail

https://packages.debian.org/source/wheezy/sup-mail

https://www.debian.org/security/2013/dsa-2805

Plugin Details

Severity: Medium

ID: 71118

File Name: debian_DSA-2805.nasl

Version: 1.10

Type: local

Agent: unix

Published: 11/29/2013

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:sup-mail, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 11/27/2013

Reference Information

CVE: CVE-2013-4478, CVE-2013-4479

BID: 63398, 63409

DSA: 2805