Updated metamail packages that fix a number of vulnerabilities are now available.
Metamail is a system for handling multimedia mail. Ulf Harnhammar discovered two format string bugs and two buffer overflow bugs in versions of Metamail up to and including 2.7. An attacker could create a carefully-crafted message such that when it is opened by a victim and parsed through Metamail, it runs arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0104 (format strings) and CAN-2004-0105 (buffer overflows) to these issues. Users of CentOS Linux 2.1 are advised to upgrade to these erratum packages, which contain a backported security patch and are not vulnerable to these issues. Please note that CentOS Linux 3 does not contain Metamail and is therefore not vulnerable to these issues. CentOS would like to thank Ulf Harnhammar for the notification and patch for these issues.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center