| VID |
21578 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Sympa software, according to its version number, has a buffer overflow vulnerability in queue.c. Sympa is open source mailing list program for Linux platforms. Sympa versions 4.1.2 and earlier are vulnerable to a stack based buffer overflow vulnerability, which can be exploited by local attackers to gain escalated privileges. This vulnerability is caused due to a boundary error in the queue utility when processing command line arguments.
* Note: This check solely relied on the version number of the Sympa software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* Platforms affected: Sympa, Sympa versions 4.1.2 and earlier Linux Any version |
| Recommendation |
Upgrade to the latest version of the Sympa (4.1.3 or later), available from the Sympa Web site at http://www.sympa.org
For Debian GNU/Linux 3.0 (woody): Upgrade to the latest version of sympa (3.3.3-3woody2 or later), as listed in Debian Security Advisory DSA-677-1 at http://www.debian.org/security/2005/dsa-677 |
| Related URL |
CVE-2005-0073 (CVE) |
| Related URL |
12527 (SecurityFocus) |
| Related URL |
19307 (ISS) |
|