Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 64037 - net-mail/ripmime: MIME Decoding Errors May Have Security Impact on Applications Using ripMIME
Summary: net-mail/ripmime: MIME Decoding Errors May Have Security Impact on Applicatio...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://securitytracker.com/alerts/200...
Whiteboard: B4 [glsa?] vorlon
Keywords:
: 64161 (view as bug list)
Depends on:
Blocks:
 
Reported: 2004-09-14 12:27 UTC by Matthias Geerdsen (RETIRED)
Modified: 2011-10-30 22:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-14 12:27:26 UTC
Confirmation can be found at http://www.uniras.gov.uk/vuls/2004/380375/mime.htm

From SecurityTracker (http://securitytracker.com/alerts/2004/Sep/1011237.html):

CVE Reference:  CAN-2003-1014 ,  CAN-2004-0052 ,  CAN-2004-0161 ,  CAN-2004-0162   
Impact:  Not specified
Fix Available:  Yes   Vendor Confirmed:  Yes  
Version(s): prior to 1.4.0.0
Description:  A vulnerability was reported in ripMIME in the processing of Multipurpose Internet Mail Extensions (MIME) content. Certain content may not be processed properly, resulting in potential security issues in applications that use ripMIME.

NISCC reported several vulnerabilities in software that processes Multipurpose Internet Mail Extensions (MIME) content. These vulnerabilities may allow a remote user to bypass content filters, cause denial of service conditions, or execute arbitrary code on the target system. The specific impact depends on the affected product.

The vulnerabilities were discovered using a test suite produced by Corsaire Ltd.

ripMIME does not correctly decode multiple filename/content entry, missing separator, header comments, empty boundary, and RFC2231 encoded filenames, according to reports.

A remote user can send MIME content containing certain fields that occur multiple times and using malformed encapsulation techniques to bypass content filtering functions [CVE: CAN-2003-1014].

A remote user can use malformed MIME encapsulation techniques that use non-standard separators (such as a double colon) to bypass content filtering functions [CVE: CAN-2004-0052].

A remote user can use malformed MIME encapsulation techniques that include fields encoded using the RFC 2231 continuations or parameter value character set and language information to bypass content filtering functions [CVE: CAN-2004-0161].

A remote user can use malformed MIME encapsulation techniques that include fields containing an RFC 822 comment to bypass content filtering functions [CVE: CAN-2004-0162].
Impact:  An application using ripMIME may not properly analyze MIME-based content. The specific impact depends on the application using ripMIME.
Solution:  The vendor has released a fixed version (1.4.0.0), available at:

http://www.pldaniels.com/ripmime/downloads.php
Vendor URL:  www.pldaniels.com/ripmime/ (Links to External Site)
Cause:  Input validation error
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-09-15 02:42:46 UTC
From http://www.uniras.gov.uk/vuls/2004/380375/mime.htm

ripMIME

Source: 

Paul L Daniels, Owner/Directory of PLDaniels (Software) - Australia

Subject: ripMIME conformance testing with the NISCC MIME exploit kit

Content:

Versions of ripMIME prior to 1.4.0.0 were found to lack the ability to correctly decode multiple filename/content entry, missing separator, header comments, empty boundary and RFC2231 encoded filenames.

ripMIME now correctly handles these exploitable items by providing in the case of ambiguous readings, all possibilities (i.e., for multiple filenames, ripMIME will create a file with each listed filename).

We would like to take this opportunity to commend the NISCC team on their highly professional conduct and realistic time schedules.
Comment 2 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-15 02:48:26 UTC
vapier, since gregf seems to be gone and you commited the last changes... can you look into/bump this?
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-20 03:11:13 UTC
Bass, can you have a look at this when you are back home later today? You have commited changes to ripmime before and this just seems to need a simple bump.

(Let this be the mail I was supposed to write you ;-)
Comment 4 SpanKY gentoo-dev 2004-09-20 05:21:01 UTC
1.4.0.0 is now in portage

need x86/sparc/ppc stable
Comment 5 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-20 05:31:42 UTC
thx vapier :)

current KEYWORDS="~x86 ~ppc ~sparc"
target KEYWORDS="x86 ppc sparc"


security, any votes on GLSA or no GLSA?
This is marked B4 and according to SecurityTracker the only impact is bypassing of content filtering functions. There was no GLSA for bug #59341 either btw.
Comment 6 Jochen Maes (RETIRED) gentoo-dev 2004-09-20 05:48:10 UTC
stable on ppc
Comment 7 Gustavo Zacarias (RETIRED) gentoo-dev 2004-09-20 06:40:20 UTC
Sparc stable.
Comment 8 SpanKY gentoo-dev 2004-09-20 21:22:42 UTC
ready for GLSA
Comment 9 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-21 01:42:59 UTC
security... please vote on a GLSA (s. comment #5)

Personally I don't think that one is needed.
Comment 10 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-09-21 10:15:47 UTC
I vote for no GLSA.
Comment 11 Andrej Kacian (RETIRED) gentoo-dev 2004-09-21 11:49:09 UTC
*** Bug 64161 has been marked as a duplicate of this bug. ***
Comment 12 Thierry Carrez (RETIRED) gentoo-dev 2004-09-21 13:58:02 UTC
Agreed. Closing with no GLSA