FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Courier mail services: remotely exploitable buffer overflows

Affected packages
courier < 0.45
courier-imap < 3.0,1
sqwebmail < 4.0

Details

VuXML ID 98bd69c3-834b-11d8-a41f-0020ed76ef5a
Discovery 2004-02-01
Entry 2004-03-31
Modified 2004-07-16

The Courier set of mail services use a common Unicode library. This library contains buffer overflows in the converters for two popular Japanese character encodings. These overflows may be remotely exploitable, triggered by a maliciously formatted email message that is later processed by one of the Courier mail services. From the release notes for the corrected versions of the Courier set of mail services:

iso2022jp.c: Converters became (upper-)compatible with ISO-2022-JP (RFC1468 / JIS X 0208:1997 Annex 2) and ISO-2022-JP-1 (RFC2237). Buffer overflow vulnerability (when Unicode character is out of BMP range) has been closed. Convert error handling was implemented.

shiftjis.c: Broken SHIFT_JIS converters has been fixed and became (upper-)compatible with Shifted Encoding Method (JIS X 0208:1997 Annex 1). Buffer overflow vulnerability (when Unicode character is out of BMP range) has been closed. Convert error handling was implemented.

References

Bugtraq ID 9845
CVE Name CVE-2004-0224
URL http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/iso2022jp.c?rev=1.10&view=markup
URL http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/shiftjis.c?rev=1.6&view=markup
URL http://secunia.com/advisories/11087
URL http://www.osvdb.org/4194
URL http://www.osvdb.org/6927