CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
80.4%
Max Vozeler discovered several format string
vulnerabilities in the movemail utility of Emacs. They can
be exploited when connecting to a malicious POP server and
can allow an attacker can execute arbitrary code under the
privileges of the user running Emacs.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | movemail | <= 1.0 | UNKNOWN |
FreeBSD | any | noarch | zh-emacs | < 20.7_4 | UNKNOWN |
FreeBSD | any | noarch | emacs | < 20.7_4 | UNKNOWN |
FreeBSD | any | noarch | xemacs | < 21.4.17 | UNKNOWN |
FreeBSD | any | noarch | xemacs-mule | < 21.4.17 | UNKNOWN |
FreeBSD | any | noarch | zh-xemacs | < 21.4.17 | UNKNOWN |
FreeBSD | any | noarch | zh-xemacs-mule | < 21.4.17 | UNKNOWN |
FreeBSD | any | noarch | xemacs-devel | < 21.5.b19,1 | UNKNOWN |
FreeBSD | any | noarch | xemacs-devel-21.5 | = b11 | UNKNOWN |
FreeBSD | any | noarch | xemacs-devel-mule | < 21.5.b19 | UNKNOWN |