Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.
Link | Tags |
---|---|
http://securitytracker.com/id?1014052 | vdb entry |
http://www.securityfocus.com/bid/13763 | vdb entry patch |
http://www.idefense.com/application/poi/display?id=248&type=vulnerabilities | third party advisory patch |
http://secunia.com/advisories/15442 | third party advisory vendor advisory |
http://www.debian.org/security/2005/dsa-732 | vendor advisory |