Buffer overflow in smail 3.2.0.120 allows remote attackers or local users to execute arbitrary code via a long string in the MAIL FROM command and possibly other SMTP commands.
                
            References
                    | Link | Resource | 
|---|---|
| http://marc.info/?l=bugtraq&m=111177045217717&w=2 | |
| http://www.debian.org/security/2005/dsa-722 | Patch Vendor Advisory | 
| http://marc.info/?l=bugtraq&m=111177045217717&w=2 | |
| http://www.debian.org/security/2005/dsa-722 | Patch Vendor Advisory | 
Configurations
                    History
                    20 Nov 2024, 23:56
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=111177045217717&w=2 - | |
| References | () http://www.debian.org/security/2005/dsa-722 - Patch, Vendor Advisory | 
Information
                Published : 2005-03-28 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0892
Mitre link : CVE-2005-0892
CVE.ORG link : CVE-2005-0892
JSON object : View
Products Affected
                smail
- smail
CWE
                