Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
References
Link | Resource |
---|---|
http://sylpheed.good-day.net/changelog.html.en | Patch Vendor Advisory |
http://sylpheed.good-day.net/changelog-devel.html.en | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml | Patch Vendor Advisory |
http://www.redhat.com/support/errata/RHSA-2005-303.html | Patch Vendor Advisory |
http://securitytracker.com/id?1013376 | Vendor Advisory |
http://secunia.com/advisories/14491 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2005-03-06 21:00
Updated : 2008-09-05 13:46
NVD link : CVE-2005-0667
Mitre link : CVE-2005-0667
JSON object : View
CWE
Products Affected
altlinux
- alt_linux
redhat
- enterprise_linux
- linux_advanced_workstation
- fedora_core
sylpheed
- sylpheed
gentoo
- linux
sylpheed-claws
- sylpheed-claws