Lucene search

K
cve[email protected]CVE-2005-0667
HistoryMar 07, 2005 - 5:00 a.m.

CVE-2005-0667

2005-03-0705:00:00
web.nvd.nist.gov
27
sylpheed
buffer overflow
cve-2005-0667
email security
remote code execution

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.055

Percentile

93.3%

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.

Affected configurations

NVD
Node
sylpheedsylpheedMatch0.8.11
OR
sylpheedsylpheedMatch0.9.4
OR
sylpheedsylpheedMatch0.9.5
OR
sylpheedsylpheedMatch0.9.6
OR
sylpheedsylpheedMatch0.9.7
OR
sylpheedsylpheedMatch0.9.8
OR
sylpheedsylpheedMatch0.9.9
OR
sylpheedsylpheedMatch0.9.10
OR
sylpheedsylpheedMatch0.9.11
OR
sylpheedsylpheedMatch0.9.12
OR
sylpheedsylpheedMatch0.9.99
OR
sylpheedsylpheedMatch1.0.0
OR
sylpheedsylpheedMatch1.0.1
OR
sylpheedsylpheedMatch1.0.2
OR
sylpheed-clawssylpheed-clawsMatch1.0.2
Node
altlinuxalt_linuxMatch2.3compact
OR
altlinuxalt_linuxMatch2.3junior
OR
gentoolinux
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatfedora_coreMatchcore_3.0
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium_processor

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.055

Percentile

93.3%