CVE-2005-2943

Stack-based buffer overflow in sendmail in XMail before 1.22 allows remote attackers to execute arbitrary code via a long -t command line option.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:davide_libenzi:xmail:1.0:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.1:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.2:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.3:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.4:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.5:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.6:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.7:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.8:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.9:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.10:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.11:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.12:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.14:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.15:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.16:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.17:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.18:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.19:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.20:*:*:*:*:*:*:*
cpe:2.3:a:davide_libenzi:xmail:1.21:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://secunia.com/advisories/17194 - () http://secunia.com/advisories/17194 -
References () http://secunia.com/advisories/17637 - () http://secunia.com/advisories/17637 -
References () http://secunia.com/advisories/18052 - () http://secunia.com/advisories/18052 -
References () http://securityreason.com/securityalert/81 - () http://securityreason.com/securityalert/81 -
References () http://securitytracker.com/id?1015055 - () http://securitytracker.com/id?1015055 -
References () http://www.debian.org/security/2005/dsa-902 - () http://www.debian.org/security/2005/dsa-902 -
References () http://www.gentoo.org/security/en/glsa/glsa-200512-05.xml - () http://www.gentoo.org/security/en/glsa/glsa-200512-05.xml -
References () http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities - Patch, Vendor Advisory
References () http://www.osvdb.org/20010 - () http://www.osvdb.org/20010 -
References () http://www.securityfocus.com/bid/15103 - () http://www.securityfocus.com/bid/15103 -
References () http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22 - () http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22724 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22724 -

Information

Published : 2005-10-13 22:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2943

Mitre link : CVE-2005-2943

CVE.ORG link : CVE-2005-2943


JSON object : View

Products Affected

davide_libenzi

  • xmail