Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/lists/fulldisclosure/2005/Dec/1037.html | Exploit Vendor Advisory | 
| http://www.idefense.com/intelligence/vulnerabilities/display.php?id=359 | Vendor Advisory | 
| http://www.securityfocus.com/bid/15980 | Exploit | 
| http://securitytracker.com/id?1015391 | |
| http://secunia.com/advisories/17640 | Vendor Advisory | 
| http://securityreason.com/securityalert/277 | |
| http://www.vupen.com/english/advisories/2005/3005 | Vendor Advisory | 
Configurations
                    Information
                Published : 2005-12-21 03:03
Updated : 2011-03-06 21:00
NVD link : CVE-2005-4267
Mitre link : CVE-2005-4267
JSON object : View
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
                qualcomm
- worldmail
 


