Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2002-1174

Опубликовано: 11 окт. 2002
Источник: debian
EPSS Низкий

Описание

Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
fetchmailfixed6.1.0-1package

EPSS

Процентиль: 88%
0.04276
Низкий

Связанные уязвимости

redhat
больше 22 лет назад

Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.

nvd
больше 22 лет назад

Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.

github
около 3 лет назад

Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.

EPSS

Процентиль: 88%
0.04276
Низкий