Stack-based buffer overflow in Gaucho 1.4 Build 145 allows remote attackers to execute arbitrary code via a POP3 email with a long Content-Type header.
Link | Tags |
---|---|
http://www.security.org.sg/vuln/gaucho140.html | exploit patch vendor advisory |
http://securitytracker.com/id?1011032 | exploit vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=109364123707953&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17090 | vdb entry |
http://www.securityfocus.com/bid/11023 | exploit vdb entry patch vendor advisory |
http://secunia.com/advisories/12387 | third party advisory patch vendor advisory |