Bug 64815 (CVE-2003-0297) - VUL-0: CVE-2003-0297: pine integer overflow
Summary: VUL-0: CVE-2003-0297: pine integer overflow
Status: VERIFIED FIXED
Alias: CVE-2003-0297
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Philipp Thomas
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2003-0297: CVSS v2 Base Score: 7....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-01-13 23:35 UTC by Ludwig Nussel
Modified: 2021-10-27 15:40 UTC (History)
1 user (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
patch used by redhat (808 bytes, patch)
2005-01-13 23:35 UTC, Ludwig Nussel
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Ludwig Nussel 2005-01-13 23:35:06 UTC
We received the following report via security@suse.de.
The issue is public.

Looks like we don't have that patched either. I can't judge if it's
really just a DoS.

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Pine packages fix security vulnerability
Advisory ID:       RHSA-2005:015-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-015.html
Issue date:        2005-01-12
Updated on:        2005-01-12
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2003-0297
- - ---------------------------------------------------------------------

1. Summary:

An updated Pine package is now available for Red Hat Enterprise Linux 2.1
to fix a denial of service attack.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Pine is an email user agent.

The c-client IMAP client library, as used in Pine 4.44 contains an integer
overflow and integer signedness flaw.  An attacker could create a malicious
IMAP server in such a way that it would cause Pine to crash.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
 CAN-2003-0297 to this issue.

Users of Pine are advised to upgrade to these erratum packages which
contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

97342 - CAN-2003-0279 c-client imap client

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/pine-4.44-20.src.rpm
10365ce656dc56e679cd17d70c506820  pine-4.44-20.src.rpm

i386:
7e8793f0bf05f544dea50fde67af462d  pine-4.44-20.i386.rpm

ia64:
68b149c040e66b19059dd9480d26ef2c  pine-4.44-20.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/pine-4.44-20.src.rpm
10365ce656dc56e679cd17d70c506820  pine-4.44-20.src.rpm

ia64:
68b149c040e66b19059dd9480d26ef2c  pine-4.44-20.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/pine-4.44-20.src.rpm
10365ce656dc56e679cd17d70c506820  pine-4.44-20.src.rpm

i386:
7e8793f0bf05f544dea50fde67af462d  pine-4.44-20.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/pine-4.44-20.src.rpm
10365ce656dc56e679cd17d70c506820  pine-4.44-20.src.rpm

i386:
7e8793f0bf05f544dea50fde67af462d  pine-4.44-20.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://marc.theaimsgroup.com/?l=bugtraq&m=105294024124163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0297

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFB5XKWXlSAg2UNWIIRAm6PAKCJA3lWLcWswVervDjSozyhjUghAgCfReM0
gWwNlHQYj+hDhooKNrL+CfA=
=iEh3
- -----END PGP SIGNATURE-----


- -- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Comment 1 Ludwig Nussel 2005-01-13 23:35:40 UTC
Created attachment 27625 [details]
patch used by redhat
Comment 2 Philipp Thomas 2005-02-08 00:33:02 UTC
OK, this only affects 8.2, submitting package in a few minutes. 
 
Comment 3 Marcus Meissner 2005-02-08 00:38:46 UTC
please do not remove cc security team 
Comment 4 Philipp Thomas 2005-02-08 00:56:21 UTC
Patch is ready, now how do I get a SWAMPID which edit_patchinfo requires? 
 
Comment 5 Ludwig Nussel 2005-02-08 00:58:48 UTC
we handle the patchinfo. Is sles8-slec affected as well? 
Comment 6 Philipp Thomas 2005-02-08 01:04:26 UTC
Yes, and I've got that ready too. Will submit both packages in a moment. 
 
Comment 7 Philipp Thomas 2005-02-08 01:19:05 UTC
Packages submitted to SLEC and 8.2. 
 
Comment 8 Marcus Meissner 2005-03-16 09:42:47 UTC
updates released. 
Comment 9 Thomas Biege 2009-10-13 19:45:20 UTC
CVE-2003-0297: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)