GLSA-200403-06 : Multiple remote buffer overflow vulnerabilities in Courier

High Nessus Plugin ID 14457


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200403-06 (Multiple remote buffer overflow vulnerabilities in Courier)

The vulnerabilities have been found in the 'SHIFT_JIS' converter in 'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c'. An attacker may supply Unicode characters that exceed BMP (Basic Multilingual Plane) range, causing an overflow.
Impact :

An attacker without privileges may exploit this vulnerability remotely, allowing arbitrary code to be executed in order to gain unauthorized access.
Workaround :

While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of the affected packages.


All users should upgrade to current versions of the affected packages:
# emerge sync # emerge -pv '>=net-mail/courier-imap-3.0.0' # emerge '>=net-mail/courier-imap-3.0.0' # ** Or; depending on your installation... ** # emerge -pv '>=mail-mta/courier-0.45' # emerge '>=mail-mta/courier-0.45'

See Also

Plugin Details

Severity: High

ID: 14457

File Name: gentoo_GLSA-200403-06.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2004/08/30

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:courier, p-cpe:/a:gentoo:linux:courier-imap, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2004/03/26

Reference Information

CVE: CVE-2004-0224

BID: 9845

GLSA: 200403-06