Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.
References
Link | Resource |
---|---|
http://seclists.org/lists/fulldisclosure/2005/Dec/1037.html | Exploit Vendor Advisory |
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=359 | Vendor Advisory |
http://www.securityfocus.com/bid/15980 | Exploit |
http://securitytracker.com/id?1015391 | |
http://secunia.com/advisories/17640 | Vendor Advisory |
http://securityreason.com/securityalert/277 | |
http://www.vupen.com/english/advisories/2005/3005 | Vendor Advisory |
Configurations
Information
Published : 2005-12-21 03:03
Updated : 2011-03-06 21:00
NVD link : CVE-2005-4267
Mitre link : CVE-2005-4267
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
qualcomm
- worldmail