{"vuid":"VU#5648","idnumber":"5648","name":"Buffer Overflows in various email clients","keywords":["Outlook express","netscape"],"overview":"Buffer Overflows in several MIME headers affect a large number of electronic mail clients.","clean_desc":"A variety of electronic mail clients (circa 1998) are vulnerable to buffer overflow attacks in the code that processes MIME headers. See the vendor statements referenced below for details specific to each mail client.","impact":"An intruder can crash vulnerable mail clients, or use them to execute arbitrary code with the privileges of the user reading the mail. If the operating system where the vulnerable program resides does not provide strong memory protection, an intruder who is able to crash the mail clinet may be able to crash the entire operating system. If a user with administrative access to the system (including Windows 95/Windows 98 users, as well as Unix 'root' or NT 'administrator') an intruder can use the vulnerability to gain administrative access to the system.","resolution":"Fixing the problem requires modifying each email client with an appropriate patch from the vendor.","workarounds":"There are several things that can be done to mitigate the risk if a patch cannot be installed. filter at the mail transfer agent (as in sendmail)\nfilter in procmail\nfilter in a firewall product None of these really fix the problem, but they may provide some additional protection. There are at least two downsides, however: 1) performance -- the MTA has to scan each and every message for the problem, potentially becoming a bottleneck. 2) Unless you decode the information completely, you run the risk of overlooking some aspect of the problem. Most classic filtering solutions rely on fingerprints of the problem, rather than interpreting the nature of the information that is being filtered. A common example is the difficulty firewalls face when trying to filter fragmented packets. Unless the firewall implements its own reassembly routines, it may allow inappropriate trafic to pass, or block appropriate traffic.","sysaffected":"","thanks":"","author":"This document was written by Shawn V Hernan.","public":["http://www.microsoft.com/security/bulletins/ms98-008.htm","http://www.netscape.com/products/security/resources/bugs/longfile.html","http://www.ciac.org/ciac/MIMEfaq.html","http://www.ciac.org/ciac/bulletins/i-077a.shtml","ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-98.02.Outlook.buffer.overflow","http://www.sjmercury.com/business/tech/docs/security072898.htm"],"cveids":[""],"certadvisory":"CA-1998-10","uscerttechnicalalert":null,"datecreated":"1999-01-05T22:39:58Z","publicdate":"1998-07-27T00:00:00Z","datefirstpublished":"2001-09-20T04:18:45Z","dateupdated":"2003-04-11T22:52:53Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"18","cam_exploitation":"10","cam_internetinfrastructure":"20","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"81","cam_scorecurrentwidelyknown":"84.375","cam_scorecurrentwidelyknownexploited":"101.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":81.0,"vulnote":null}