Fedora 10 : php-pear-Mail-1.1.14-5.fc10 (2009-12439)

High Nessus Plugin ID 42940


The remote Fedora host is missing a security update.


Fix CVE-2009-4023, CVE-2009-4111 PEAR's Mail class did not properly escape content of mail header fields, when using the sendmail backend.
A remote attacker could send an email message, with specially crafted headers to local user, leading to disclosure of content and potentially, to modification of arbitrary system file, once the email message was processed by the PEAR's Mail class.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected php-pear-Mail package.

See Also



Plugin Details

Severity: High

ID: 42940

File Name: fedora_2009-12439.nasl

Version: $Revision: 1.13 $

Type: local

Agent: unix

Published: 2009/12/01

Modified: 2015/10/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php-pear-Mail, cpe:/o:fedoraproject:fedora:10

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/12/01

Reference Information

CVE: CVE-2009-4023

BID: 37081

FEDORA: 2009-12439

CWE: 94