Rapid7 Vulnerability & Exploit Database

RHSA-2005:133: xemacs security update

Back to Search

RHSA-2005:133: xemacs security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
02/07/2005
Created
07/25/2018
Added
10/28/2005
Modified
07/12/2017

Description

Updated XEmacs packages that fix a string format issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

XEmacs is a powerful, customizable, self-documenting, modeless text editor. Max Vozeler discovered several format string vulnerabilities in the movemail utility of XEmacs. If a user connects to a malicious POP server, an attacker can execute arbitrary code as the user running xemacs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0100 to this issue. Users of XEmacs are advised to upgrade to these updated packages, which contain backported patches to correct this issue.

Solution(s)

  • redhat-upgrade-xemacs
  • redhat-upgrade-xemacs-common
  • redhat-upgrade-xemacs-el
  • redhat-upgrade-xemacs-info
  • redhat-upgrade-xemacs-nox

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;