Ximian Evolution < 1.2.3 MIME image/* Content-Type Data Injection

low Nessus Network Monitor Plugin ID 1308

Synopsis

The remote host may be tricked into running an executable file

Description

The remote host is running a version of the Ximian Evolution email client that does not properly validate MIME image/* Content-Type fields. If an email message contains an image/* Content-Type, any type of data can be embedded where the image information is expected. This can be used to embed HTML tags that will be rendered by GTKHtml, bypass policies, or invoke bonobo components to handle external content types.

Solution

Upgrade to Evolution 1.2.3 or higher.

Plugin Details

Severity: Low

ID: 1308

Family: SMTP Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ximian:evolution

Reference Information

CVE: CVE-2003-0130

BID: 7119