Buffer overflow in smail 3.2.0.120, allows remote code execution via long string in MAIL FROM comman
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
Debian | [SECURITY] [DSA 722-1] New smail packages fix arbitrary code execution | 9 May 200513:18 | – | debian |
Debian | [SECURITY] [DSA 722-1] New smail packages fix arbitrary code execution | 9 May 200513:18 | – | debian |
OpenVAS | Debian Security Advisory DSA 722-1 (smail) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-722-1) | 17 Jan 200800:00 | – | openvas |
CVE | CVE-2005-0892 | 29 Mar 200505:00 | – | cve |
NVD | CVE-2005-0892 | 28 Mar 200505:00 | – | nvd |
UbuntuCve | CVE-2005-0892 | 28 Mar 200500:00 | – | ubuntucve |
Tenable Nessus | Debian DSA-722-1 : smail - buffer overflow | 11 May 200500:00 | – | nessus |
Tenable Nessus | Smail-3 < 3.2.0.121 Multiple Vulnerabilities | 25 Mar 200500:00 | – | nessus |
Source | Link |
---|---|
marc | www.marc.info/ |
debian | www.debian.org/security/2005/dsa-722 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo