RHEL 2.1 : balsa (RHSA-2003:111)

High Nessus Plugin ID 12382


The remote Red Hat host is missing one or more security updates.


Updated Balsa packages are available which fix potential vulnerabilities in the IMAP handling code and in libesmtp.

Balsa is a GNOME email client which includes code from Mutt.

A potential buffer overflow exists in Balsa versions 1.2 and higher when parsing mailbox names returned by an IMAP server. It is possible that a hostile IMAP server could cause arbitrary code to be executed by the user running Balsa.

Additionally, a buffer overflow in libesmtp (an SMTP library used by Balsa) before version 0.8.11 allows a hostile remote SMTP server to execute arbitrary code via a certain response or cause a denial of service via long server responses.

Users of Balsa are recommended to upgrade to these erratum packages which include updated versions of Balsa and libesmtp which are not vulnerable to these issues.

Red Hat would like to thank CORE security for discovering the vulnerability, and the Mutt team for providing a patch.


Update the affected balsa, libesmtp and / or libesmtp-devel packages.

See Also




Plugin Details

Severity: High

ID: 12382

File Name: redhat-RHSA-2003-111.nasl

Version: $Revision: 1.22 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:balsa, p-cpe:/a:redhat:enterprise_linux:libesmtp, p-cpe:/a:redhat:enterprise_linux:libesmtp-devel, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2003/05/22

Reference Information

CVE: CVE-2002-1090, CVE-2003-0140

RHSA: 2003:111