Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.
Link | Tags |
---|---|
http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407 | patch |
http://secunia.com/advisories/17020 | third party advisory |
http://www.gentoo.org/security/en/glsa/glsa-200509-10.xml | vendor advisory |
http://secunia.com/advisories/16783 | third party advisory |
http://www.idefense.com/application/poi/display?id=303&type=vulnerabilities&flashstatus=true | exploit third party advisory patch vendor advisory |
http://www.rosiello.org/archivio/imap4d_FreeBSD_exploit.c | |
http://www.debian.org/security/2005/dsa-841 | vendor advisory |
http://marc.info/?l=bugtraq&m=112785181316043&w=2 | mailing list |
http://www.securityfocus.com/bid/14794 | vdb entry |