Gentoo: pine address buffer overflow vulnerability
Summary
- -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200212-1 - -------------------------------------------------------------------- DATE : 2002-12-02 13:12 UTC
- --------------------------------------------------------------------
An attacker can send a fully legal email message with a crafted From-header and thus forcing pine to core dump on startup. The only way to launch pine is manually removing the bad message either directly from the spool, or from another MUA. Until the message has been removed or edited there is no way of accessing the INBOX using pine.
Read the full advisory at http://marc.theaimsgroup.com/?l=bugtraq&m=103668430620531&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running net-mail/pine-4.44-r5 and earlier update their systems as follows:
emerge rsync emerge pine emerge clean
...Read the Full Advisory