Lucene search

K

[SECURITY] [DSA 722-1] New smail packages fix arbitrary code execution

🗓️ 09 May 2005 13:00:18Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 15 Views

A buffer overflow in Smail allows remote attackers to execute arbitrary code. Upgrade to fixed packages

Show more
Related
Packages
ReporterTitlePublishedViews
Family
Exploit DB
Smail 3.2.0.120 - Remote Heap Overflow
28 Mar 200500:00
exploitdb
Exploit DB
Smail 3 - Multiple Remote/Local Vulnerabilities
25 Mar 200500:00
exploitdb
OpenVAS
Debian: Security Advisory (DSA-722-1)
17 Jan 200800:00
openvas
OpenVAS
Debian Security Advisory DSA 722-1 (smail)
17 Jan 200800:00
openvas
UbuntuCve
CVE-2005-0892
28 Mar 200500:00
ubuntucve
CVE
CVE-2005-0892
29 Mar 200505:00
cve
Debian
[SECURITY] [DSA 722-1] New smail packages fix arbitrary code execution
9 May 200513:18
debian
Cvelist
CVE-2005-0892
29 Mar 200505:00
cvelist
NVD
CVE-2005-0892
28 Mar 200505:00
nvd
Tenable Nessus
Smail-3 < 3.2.0.121 Multiple Vulnerabilities
25 Mar 200500:00
nessus
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3m68ksmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_m68k.deb
Debian3powerpcsmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_powerpc.deb
Debian3ia64smail3.2.0.114-4woody1smail_3.2.0.114-4woody1_ia64.deb
Debian3mipssmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_mips.deb
Debian3mipselsmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_mipsel.deb
Debian3sparcsmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_sparc.deb
Debian3allsmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_all.deb
Debian3armsmail3.2.0.114-4woody1smail_3.2.0.114-4woody1_arm.deb
Debian3i386smail3.2.0.114-4woody1smail_3.2.0.114-4woody1_i386.deb
Debian3s390smail3.2.0.114-4woody1smail_3.2.0.114-4woody1_s390.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo