Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.52152
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: sylpheed, sylpheed-claws, sylpheed-gtk2
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to the system
as announced in the referenced advisory.

The following packages are affected:
sylpheed
sylpheed-claws
sylpheed-gtk2

CVE-2005-0667
Buffer overflow in Sylpheed before 1.0.3 and other versions before
1.9.5 allows remote attackers to execute arbitrary code via an e-mail
message with certain headers containing non-ASCII characters that are
not properly handled when the user replies to the message.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://sylpheed.good-day.net/index.cgi.en#changes
http://www.vuxml.org/freebsd/f8536143-9bc4-11d9-b8b3-000a95bc6fae.html

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0667
http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml
http://www.redhat.com/support/errata/RHSA-2005-303.html
http://securitytracker.com/id?1013376
http://secunia.com/advisories/14491
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.