Vulnerabilities (CVE)

Filtered by vendor Procmail Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2001-0905 1 Procmail 1 Procmail 2024-11-20 6.2 MEDIUM N/A
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
CVE-1999-0475 1 Procmail 1 Procmail 2024-11-20 1.2 LOW N/A
A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail.
CVE-1999-0439 2 Caldera, Procmail 2 Openlinux, Procmail 2024-11-20 7.5 HIGH N/A
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
CVE-2017-16844 1 Procmail 1 Procmail 2024-02-04 10.0 HIGH 9.8 CRITICAL
Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
CVE-2014-3618 2 Canonical, Procmail 2 Ubuntu Linux, Procmail 2024-02-04 7.5 HIGH N/A
Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."