blob: 0d85c6d0562a91411f3086ae6e9c492db0017929 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200506-02">
<title>Mailutils: SQL Injection</title>
GNU Mailutils is vulnerable to SQL command injection attacks.
<product type="ebuild">mailutils</product>
<announced>June 06, 2005</announced>
<revised>June 06, 2005: 01</revised>
<package name="net-mail/mailutils" auto="yes" arch="*">
<unaffected range="ge">0.6-r1</unaffected>
<vulnerable range="lt">0.6-r1</vulnerable>
GNU Mailutils is a collection of mail-related utilities.
When GNU Mailutils is built with the "mysql" or "postgres" USE
flag, the sql_escape_string function of the authentication module fails
to properly escape the "\" character, rendering it vulnerable to a SQL
command injection.
<impact type="normal">
A malicious remote user could exploit this vulnerability to inject
SQL commands to the underlying database.
There is no known workaround at this time.
All GNU Mailutils users should upgrade to the latest available
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r1&quot;</code>
<uri link="">CAN-2005-1824</uri>
<metadata tag="requester" timestamp="Sun, 05 Jun 2005 13:35:06 +0000">
<metadata tag="submitter" timestamp="Sun, 05 Jun 2005 17:42:35 +0000">
<metadata tag="bugReady" timestamp="Mon, 06 Jun 2005 11:45:10 +0000">