Format string vulnerability in qwik-smtpd.c in QwikMail SMTP (qwik-smtpd) 0.3 and earlier allows remote attackers to execute arbitrary code via format specifiers in the (1) clientRcptTo array, and the (2) Received and (3) messageID variables, possibly involving HELO and hostname arguments.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/11572 | patch vendor advisory vdb entry exploit |
http://securitytracker.com/id?1012016 | patch vendor advisory vdb entry |
http://unl0ck.info/advisories/qwik-smtpd.txt | |
http://secunia.com/advisories/13037 | patch vendor advisory third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17917 | vdb entry |
http://www.vupen.com/english/advisories/2007/0687 | vdb entry |
http://qwikmail.sourceforge.net/smtpd/qwik-smtpd-0.3.patch | patch |
http://www.securityfocus.com/archive/1/460600/100/0/threaded | mailing list |