ID CVE-2003-0721
Summary Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
References
Vulnerable Configurations
  • cpe:2.3:a:university_of_washington:pine:3.98:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:3.98:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.10:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.30:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.30:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.33:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.33:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.44:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.44:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.50:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.50:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.52:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.52:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*
  • cpe:2.3:a:university_of_washington:pine:4.56:*:*:*:*:*:*:*
    cpe:2.3:a:university_of_washington:pine:4.56:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-05-2018 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2007-04-25T19:52:33.657-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
family unix
id oval:org.mitre.oval:def:503
status accepted
submitted 2003-09-12T12:00:00.000-04:00
title Integer Signedness Error in PINE
version 36
redhat via4
advisories
  • rhsa
    id RHSA-2003:273
  • rhsa
    id RHSA-2003:274
refmap via4
bugtraq
  • 20030911 [slackware-security] security issues in pine (SSA:2003-253-01)
  • 20030915 remote Pine <= 4.56 exploit fully automatic
engarde ESA-20030911-022
fulldisc 20030911 Pine: .procmailrc rule against integer overflow
idefense 20030910 Two Exploitable Overflows in PINE
suse SuSE-SA:2003:037
Last major update 03-05-2018 - 01:29
Published 17-09-2003 - 04:00
Last modified 03-05-2018 - 01:29
Back to Top