First published: Fri Dec 31 2004(Updated: )
ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RIPMime | =1.2.0 | |
RIPMime | =1.2.2 | |
RIPMime | =1.3.2.2 | |
RIPMime | =1.2.3 | |
RIPMime | =1.2.6 | |
RIPMime | =1.2.5 | |
RIPMime | <=1.3.2.3 | |
RIPMime | =1.3.2.0 | |
RIPMime | =1.2.1 | |
RIPMime | =1.2.4 | |
RIPMime | =1.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2619 has a medium severity rating due to its ability to allow bypass of email protection.
To resolve CVE-2004-2619, update ripMIME to version 1.3.2.4 or later, which includes a fix for this vulnerability.
CVE-2004-2619 affects ripMIME versions 1.2.0 through 1.3.2.3.
CVE-2004-2619 allows remote attackers to bypass email protection mechanisms through specially crafted base64 MIME attachments.
CVE-2004-2619 is related to ripMIME, developed by Paul L. Daniels.