No description provided by source.
source: http://www.securityfocus.com/bid/26270/info Perdition IMAP proxy server is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. An attacker can exploit this issue to execute arbitrary machine code in the context of the affected application. A successful attack will compromise the application. Failed attempts may cause denial-of-service conditions. This issue affects Perdition 1.17 and prior versions. The following proof of concept is available: perl -e 'print "abc%n\x00\n"' | nc perdition.example.com 143