English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 95248 CVE descriptions
and 52540 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53731
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 163-1 (mhonarc)
Summary:Debian Security Advisory DSA 163-1 (mhonarc)
Description:Description:
The remote host is missing an update to mhonarc
announced via advisory DSA 163-1.

Jason Molenda and Hiromitsu Takagi found ways to exploit cross site
scripting bugs in mhonarc, a mail to HTML converter. When processing
maliciously crafted mails of type text/html, mhonarc, does not
deactivate all scripting parts properly. This is fixed in upstream
version 2.5.3.

If you are worried about security, it is recommended that you disable
support of text/html messages in your mail archives. There is no
guarantee that the mhtxthtml.pl library is robust enough to eliminate
all possible exploits that can occur with HTML data.

To exclude HTML data, you can use the MIMEEXCS resource. For example:


text/html
text/x-html


The use of text/x-html is probably not used any more, but is good to
include it, just-in-case.

If you are concerend that this could block out the entire contents of
some messages, then you could do the following instead:


text/html
m2h_text_plain::filter
mhtxtplain.pl
text/x-html
m2h_text_plain::filter
mhtxtplain.pl


This treats the HTML as text/plain.

The above problems have been fixed in version 2.5.2-1.1 for the
current stable stable distribution (woody), in version 2.4.4-1.1 for
the old stable distribution (potato) and in version 2.5.11-1 for the
unstable distribution (sid).

We recommend that you upgrade your mhonarc packages.


Solution:
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20163-1

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: BugTraq ID: 4546
Common Vulnerability Exposure (CVE) ID: CVE-2002-0738
Bugtraq: 20020418 MHonArc v2.5.2 Script Filtering Bypass Vulnerability (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0260.html
Debian Security Information: DSA-163 (Google Search)
http://www.debian.org/security/2002/dsa-163
http://www.iss.net/security_center/static/8894.php
http://www.securityfocus.com/bid/4546
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.