|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 163-1 (mhonarc)|
|Summary:||Debian Security Advisory DSA 163-1 (mhonarc)|
The remote host is missing an update to mhonarc
announced via advisory DSA 163-1.
Jason Molenda and Hiromitsu Takagi found ways to exploit cross site
scripting bugs in mhonarc, a mail to HTML converter. When processing
maliciously crafted mails of type text/html, mhonarc, does not
deactivate all scripting parts properly. This is fixed in upstream
If you are worried about security, it is recommended that you disable
support of text/html messages in your mail archives. There is no
guarantee that the mhtxthtml.pl library is robust enough to eliminate
all possible exploits that can occur with HTML data.
To exclude HTML data, you can use the MIMEEXCS resource. For example:
The use of text/x-html is probably not used any more, but is good to
include it, just-in-case.
If you are concerend that this could block out the entire contents of
some messages, then you could do the following instead:
This treats the HTML as text/plain.
The above problems have been fixed in version 2.5.2-1.1 for the
current stable stable distribution (woody), in version 2.4.4-1.1 for
the old stable distribution (potato) and in version 2.5.11-1 for the
unstable distribution (sid).
We recommend that you upgrade your mhonarc packages.
BugTraq ID: 4546|
Common Vulnerability Exposure (CVE) ID: CVE-2002-0738
Bugtraq: 20020418 MHonArc v2.5.2 Script Filtering Bypass Vulnerability (Google Search)
Debian Security Information: DSA-163 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 50192 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.