Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408 | vdb entry signature |
http://www.debian.org/security/2005/dsa-671 | patch vendor advisory |
http://www.securityfocus.com/archive/1/433928/30/5010/threaded | vendor advisory |
http://www.debian.org/security/2005/dsa-670 | patch vendor advisory |
http://marc.info/?l=bugtraq&m=110780416112719&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2005-110.html | patch vendor advisory |
http://www.debian.org/security/2005/dsa-685 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19246 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2005-133.html | patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-112.html | patch vendor advisory |
http://www.securityfocus.com/bid/12462 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:038 | vendor advisory |