Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
References
Link | Resource |
---|---|
http://secunia.com/advisories/14491 | Patch Vendor Advisory |
http://securitytracker.com/id?1013376 | Vendor Advisory |
http://sylpheed.good-day.net/changelog-devel.html.en | Patch Vendor Advisory |
http://sylpheed.good-day.net/changelog.html.en | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml | Patch Vendor Advisory |
http://www.redhat.com/support/errata/RHSA-2005-303.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2005-03-07 05:00
Updated : 2024-02-04 16:52
NVD link : CVE-2005-0667
Mitre link : CVE-2005-0667
CVE.ORG link : CVE-2005-0667
JSON object : View
Products Affected
altlinux
- alt_linux
sylpheed-claws
- sylpheed-claws
gentoo
- linux
redhat
- fedora_core
- enterprise_linux
- linux_advanced_workstation
sylpheed
- sylpheed
CWE