A buffer overflow in Smail allows remote code execution. Upgrade to version 3.2.0.114-4woody1 for woody distribution and 3.2.0.115-7 for sid distribution
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
UbuntuCve | CVE-2005-0892 | 28 Mar 200500:00 | – | ubuntucve |
CVE | CVE-2005-0892 | 29 Mar 200505:00 | – | cve |
OpenVAS | Debian Security Advisory DSA 722-1 (smail) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-722-1) | 17 Jan 200800:00 | – | openvas |
Exploit DB | Smail 3 - Multiple Remote/Local Vulnerabilities | 25 Mar 200500:00 | – | exploitdb |
Exploit DB | Smail 3.2.0.120 - Remote Heap Overflow | 28 Mar 200500:00 | – | exploitdb |
NVD | CVE-2005-0892 | 28 Mar 200505:00 | – | nvd |
Cvelist | CVE-2005-0892 | 29 Mar 200505:00 | – | cvelist |
Debian | [SECURITY] [DSA 722-1] New smail packages fix arbitrary code execution | 9 May 200513:18 | – | debian |
Tenable Nessus | Smail-3 < 3.2.0.121 Multiple Vulnerabilities | 25 Mar 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | s390 | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_s390.deb |
Debian | 3 | powerpc | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_powerpc.deb |
Debian | 3 | mipsel | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_mipsel.deb |
Debian | 3 | mips | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_mips.deb |
Debian | 3 | alpha | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_alpha.deb |
Debian | 3 | i386 | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_i386.deb |
Debian | 3 | sparc | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_sparc.deb |
Debian | 3 | arm | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_arm.deb |
Debian | 3 | ia64 | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_ia64.deb |
Debian | 3 | hppa | smail | 3.2.0.114-4woody1 | smail_3.2.0.114-4woody1_hppa.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo