Multiple buffer overflows in YaMT before 0.5_2 allow attackers to execute arbitrary code via the (1) rename or (2) sort options.
References
Link | Resource |
---|---|
http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html | Patch Vendor Advisory |
http://www.vuxml.org/freebsd/99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93.html | Patch Vendor Advisory |
http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html | Patch Vendor Advisory |
http://www.vuxml.org/freebsd/99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93.html | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html - Patch, Vendor Advisory | |
References | () http://www.vuxml.org/freebsd/99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93.html - Patch, Vendor Advisory |
Information
Published : 2005-01-20 05:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-1847
Mitre link : CVE-2005-1847
CVE.ORG link : CVE-2005-1847
JSON object : View
Products Affected
yamt
- yamt
CWE