{"vuid":"VU#428230","idnumber":"428230","name":"Multiple vulnerabilities in S/MIME implementations","keywords":["NISCC","UNIRAS","OUSPG","S/MIME","ASN.1"],"overview":"Multiple vulnerabilities exist in different vendors' S/MIME (Secure/Multipurpose Internet Mail Extensions) implementations. The impacts of these vulnerabilities are varied and range from denial of service to potential remote execution of arbitrary code.","clean_desc":"The U.K. National Infrastructure Security Co-ordination Center (NISCC) has reported multiple vulnerabilities in different vendors' implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol. S/MIME allows binary objects and attachments to be sent across an email system. S/MIME extends the MIME specification by including the secure data in an attachment encoded using ASN.1. If one of the entities in an email system knowingly or unknowingly send an exceptional ASN.1 element that cannot be handled properly by another party, the behavior of the application receiving such an element is unpredictable. A test suite developed by NISCC has exposed vulnerabilities in a variety of S/MIME implementations. While most of these vulnerabilities exist in ASN.1 parsing routines, some vulnerabilities may occur elsewhere. Note that cryptographic libraries that implement S/MIME frequently provide more general-purpose cryptographic utility. In such libraries, it is common for ASN.1 parsing code to be shared between S/MIME and other cryptographic functions. Due to the general lack of specific vulnerability information, this document covers multiple vulnerabilities in different S/MIME implementations. Information about individual vendors is available in the Systems Affected section. Further information is available in NISCC Vulnerability Advisory - 006489/SMIME","impact":"The impacts associated with these vulnerabilities include denial of service, and potential execution of arbitrary code.","resolution":"Patch or Upgrade Apply a patch or upgrade as appropriate. Information about specific vendors is available in the Systems Affected section of this document.","workarounds":"","sysaffected":"","thanks":"These vulnerabilities were discovered and researched by the \nNISCC\n Vulnerability Management Team.","author":"This document was written by Chad R Dougherty based on information from NISCC.","public":["http://www.uniras.gov.uk/vuls/2003/006489/smime.htm","http://www.ietf.org/rfc/rfc2633.txt","http://www.itu.int/ITU-T/asn1/"],"cveids":["CVE-2003-0564"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-10-27T16:50:26Z","publicdate":"2003-11-04T00:00:00Z","datefirstpublished":"2003-11-04T18:48:20Z","dateupdated":"2003-12-08T22:02:15Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"18","cam_impact":"6","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"8.505","cam_scorecurrentwidelyknown":"17.01","cam_scorecurrentwidelyknownexploited":"28.35","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.505,"vulnote":null}