5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%
Georgi Guninski and the Qualys Research Labs discovered multiple vulnerabilities in qmail (shipped in Debian as netqmail with additional patches) which could result in the execution of arbitrary code, bypass of mail address verification and a local information leak whether a file exists or not.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-4692. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('compat.inc');
if (description)
{
script_id(136837);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/08");
script_cve_id(
"CVE-2005-1513",
"CVE-2005-1514",
"CVE-2005-1515",
"CVE-2020-3811",
"CVE-2020-3812"
);
script_xref(name:"DSA", value:"4692");
script_name(english:"Debian DSA-4692-1 : netqmail - security update");
script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing a security-related update.");
script_set_attribute(attribute:"description", value:
"Georgi Guninski and the Qualys Research Labs discovered multiple
vulnerabilities in qmail (shipped in Debian as netqmail with
additional patches) which could result in the execution of arbitrary
code, bypass of mail address verification and a local information leak
whether a file exists or not.");
script_set_attribute(attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961060");
script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/netqmail");
script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/stretch/netqmail");
script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/buster/netqmail");
script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2020/dsa-4692");
script_set_attribute(attribute:"solution", value:
"Upgrade the netqmail packages.
For the oldstable distribution (stretch), these problems have been
fixed in version 1.06-6.2~deb9u1.
For the stable distribution (buster), these problems have been fixed
in version 1.06-6.2~deb10u1.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3811");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2005-1513");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2005/05/11");
script_set_attribute(attribute:"patch_publication_date", value:"2020/05/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/26");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:netqmail");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Debian Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"10.0", prefix:"qmail", reference:"1.06-6.2~deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"qmail-uids-gids", reference:"1.06-6.2~deb10u1")) flag++;
if (deb_check(release:"9.0", prefix:"qmail", reference:"1.06-6.2~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"qmail-uids-gids", reference:"1.06-6.2~deb9u1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | netqmail | p-cpe:/a:debian:debian_linux:netqmail |
debian | debian_linux | 10.0 | cpe:/o:debian:debian_linux:10.0 |
debian | debian_linux | 9.0 | cpe:/o:debian:debian_linux:9.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1513
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3812
bugs.debian.org/cgi-bin/bugreport.cgi?bug=961060
packages.debian.org/source/buster/netqmail
packages.debian.org/source/stretch/netqmail
security-tracker.debian.org/tracker/source-package/netqmail
www.debian.org/security/2020/dsa-4692
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%