Format string vulnerability in qwik-smtpd.c in QwikMail SMTP (qwik-smtpd) 0.3 and earlier allows remote attackers to execute arbitrary code via format specifiers in the (1) clientRcptTo array, and the (2) Received and (3) messageID variables, possibly involving HELO and hostname arguments.
                
            References
                    Configurations
                    History
                    20 Nov 2024, 23:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://qwikmail.sourceforge.net/smtpd/qwik-smtpd-0.3.patch - Patch | |
| References | () http://secunia.com/advisories/13037 - Patch, Vendor Advisory | |
| References | () http://securitytracker.com/id?1012016 - Patch, Vendor Advisory | |
| References | () http://unl0ck.info/advisories/qwik-smtpd.txt - | |
| References | () http://www.securityfocus.com/archive/1/460600/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/11572 - Exploit, Patch, Vendor Advisory | |
| References | () http://www.vupen.com/english/advisories/2007/0687 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17917 - | 
Information
                Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2677
Mitre link : CVE-2004-2677
CVE.ORG link : CVE-2004-2677
JSON object : View
Products Affected
                qwikmail
- qwikmail_smtp
 
CWE
                