Rapid7 Vulnerability & Exploit Database

CESA-2003:111: balsa security update

Back to Search

CESA-2003:111: balsa security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
03/24/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated Balsa packages are available which fix potential vulnerabilities in the IMAP handling code and in libesmtp.

Balsa is a GNOME email client which includes code from Mutt. A potential buffer overflow exists in Balsa versions 1.2 and higher when parsing mailbox names returned by an IMAP server. It is possible that a hostile IMAP server could cause arbitrary code to be executed by the user running Balsa. Additionally, a buffer overflow in libesmtp (an SMTP library used by Balsa) before version 0.8.11 allows a hostile remote SMTP server to execute arbitrary code via a certain response or cause a denial of service via long server responses. Users of Balsa are recommended to upgrade to these erratum packages which include updated versions of Balsa and libesmtp which are not vulnerable to these issues. CentOS would like to thank CORE security for discovering the vulnerability, and the Mutt team for providing a patch.

Solution(s)

  • centos-upgrade-balsa
  • centos-upgrade-libesmtp
  • centos-upgrade-libesmtp-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;