Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
References
Link | Resource |
---|---|
http://secunia.com/secunia_research/2005-61/advisory/ | Vendor Advisory |
http://www.pmail.com/newsflash.htm#secunia | Patch Vendor Advisory |
http://www.securityfocus.com/bid/15973 | |
http://secunia.com/advisories/17992 | Patch Vendor Advisory |
http://www.osvdb.org/21842 | |
http://securitytracker.com/id?1015385 | |
http://www.vupen.com/english/advisories/2005/3004 | Vendor Advisory |
http://www.securityfocus.com/archive/1/419908/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-12-20 18:03
Updated : 2018-10-19 08:40
NVD link : CVE-2005-4444
Mitre link : CVE-2005-4444
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
david_harris
- pegasus_mail