First published: Fri Jan 28 2011(Updated: )
The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVAS Manager | =1.0.0-beta2 | |
OpenVAS Manager | =2.0-rc1 | |
OpenVAS Manager | =1.0.0-beta5 | |
OpenVAS Manager | =1.0.0 | |
OpenVAS Manager | =1.0.2 | |
OpenVAS Manager | =2.0-beta2 | |
OpenVAS Manager | =1.0.1 | |
OpenVAS Manager | =2.0-rc2 | |
OpenVAS Manager | =1.0.0-beta4 | |
OpenVAS Manager | =2.0-beta1 | |
OpenVAS Manager | =1.0.0-rc1 | |
OpenVAS Manager | =1.0.0-beta7 | |
OpenVAS Manager | =2.0-beta3 | |
OpenVAS Manager | =1.0.0-beta3 | |
OpenVAS Manager | =1.0.0-beta6 | |
OpenVAS Manager | =1.0.0-beta1 | |
OpenVAS Manager | =1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0018 is considered a medium severity vulnerability.
To fix CVE-2011-0018, you should upgrade your OpenVAS Manager to version 2.0.0 or later.
CVE-2011-0018 affects OpenVAS Manager versions 1.0.x through 1.0.3 and 2.0.x through 2.0rc2.
CVE-2011-0018 can be exploited by remote authenticated users to execute arbitrary commands.
The vulnerability in CVE-2011-0018 is related to the email function in manage_sql.c of OpenVAS Manager.