CVE-2005-0667

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sylpheed:sylpheed:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.99:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed-claws:sylpheed-claws:1.0.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://secunia.com/advisories/14491 - Patch, Vendor Advisory () http://secunia.com/advisories/14491 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1013376 - Vendor Advisory () http://securitytracker.com/id?1013376 - Vendor Advisory
References () http://sylpheed.good-day.net/changelog-devel.html.en - Patch, Vendor Advisory () http://sylpheed.good-day.net/changelog-devel.html.en - Patch, Vendor Advisory
References () http://sylpheed.good-day.net/changelog.html.en - Patch, Vendor Advisory () http://sylpheed.good-day.net/changelog.html.en - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-303.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-303.html - Patch, Vendor Advisory

Information

Published : 2005-03-07 05:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0667

Mitre link : CVE-2005-0667

CVE.ORG link : CVE-2005-0667


JSON object : View

Products Affected

altlinux

  • alt_linux

sylpheed-claws

  • sylpheed-claws

gentoo

  • linux

redhat

  • fedora_core
  • enterprise_linux
  • linux_advanced_workstation

sylpheed

  • sylpheed