Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15442 - Vendor Advisory | |
References | () http://securitytracker.com/id?1014052 - | |
References | () http://www.debian.org/security/2005/dsa-732 - | |
References | () http://www.idefense.com/application/poi/display?id=248&type=vulnerabilities - Patch | |
References | () http://www.securityfocus.com/bid/13763 - Patch |
Information
Published : 2005-05-26 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-1521
Mitre link : CVE-2005-1521
CVE.ORG link : CVE-2005-1521
JSON object : View
Products Affected
gnu
- mailutils
CWE