USN-4556-1

Source
https://ubuntu.com/security/notices/USN-4556-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4556-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4556-1
Upstream
Related
Published
2020-09-29T15:16:58Z
Modified
2026-02-10T04:41:56Z
Summary
netqmail vulnerabilities
Details

It was discovered that netqmail did not properly handle certain input. Both remote and local attackers could use this vulnerability to cause netqmail to crash or execute arbitrary code. (CVE-2005-1513, CVE-2005-1514, CVE-2005-1515)

It was discovered that netqmail did not properly handle certain input when validating email addresses. An attacker could use this to bypass email address validation. (CVE-2020-3811)

It was discovered that netqmail did not properly handle certain input when validating email addresses. An attacker could use this vulnerability to cause netqmail to disclose sensitive information. (CVE-2020-3812)

References

Affected packages

Ubuntu:20.04:LTS / netqmail

Package

Name
netqmail
Purl
pkg:deb/ubuntu/netqmail@1.06-6.2~deb10u1build0.20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.06-6.2~deb10u1build0.20.04.1

Affected versions

1.*
1.06-6.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.06-6.2~deb10u1build0.20.04.1",
            "binary_name": "qmail"
        },
        {
            "binary_version": "1.06-6.2~deb10u1build0.20.04.1",
            "binary_name": "qmail-uids-gids"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4556-1.json"
cves_map
{
    "cves": [
        {
            "id": "CVE-2005-1513",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2005-1514",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2005-1515",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2020-3811",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2020-3812",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}