Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p738-58m7-hr43

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.

EPSS

Процентиль: 88%
0.04102
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.

nvd
больше 20 лет назад

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.

debian
больше 20 лет назад

Integer overflow in the fetch_io function of the imap4d server in GNU ...

EPSS

Процентиль: 88%
0.04102
Низкий