Vulnerability Name: | CVE-2005-1520 (CCN-20722) | ||||||||
Assigned: | 2005-05-25 | ||||||||
Published: | 2005-05-25 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a crafted e-mail. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-1520 Source: CCN Type: freshmeat.net Web site GNU Mailutils - Default branch Source: CCN Type: SA15442 Mailutils Four Vulnerabilities Source: SECUNIA Type: Vendor Advisory 15442 Source: CCN Type: SECTRACK ID: 1014052 GNU Mailutils Buffer Overflow and Format String Bugs Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1014052 Source: DEBIAN Type: UNKNOWN DSA-732 Source: DEBIAN Type: DSA-732 mailutils -- several vulnerabilities Source: CCN Type: GLSA-200505-20 Mailutils: Multiple vulnerabilities in imap4d and mail Source: CCN Type: GNU Mailutils Web page GNU Mailutils Source: CCN Type: iDEFENSE Security Advisory 05.25.05 GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability Source: IDEFENSE Type: Patch 20050525 GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability Source: CCN Type: OSVDB ID: 16854 GNU Mailutils Mail header_get_field_name() Function Remote Overflow Source: BID Type: Patch 13766 Source: CCN Type: BID-13766 GNU Mailutils Mail Email Header Buffer Overflow Vulnerability Source: XF Type: UNKNOWN gnu-mailutils-headergetfield-bo(20722) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |