Описание
Multiple stack-based and heap-based buffer overflows in EnderUNIX spamGuard before 1.7-BETA allow remote attackers to execute arbitrary code via the (1) qmail_parseline and (2) sendmail_parseline functions in parser.c, (3) loadconfig and (4) removespaces functions in loadconfig.c, and possibly (5) unspecified functions in functions.c.
Ссылки
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
- Patch
- Patch
- Patch
- Patch
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
- Patch
- Patch
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:enderunix_software:spamguard:1.6:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04874
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Multiple stack-based and heap-based buffer overflows in EnderUNIX spamGuard before 1.7-BETA allow remote attackers to execute arbitrary code via the (1) qmail_parseline and (2) sendmail_parseline functions in parser.c, (3) loadconfig and (4) removespaces functions in loadconfig.c, and possibly (5) unspecified functions in functions.c.
EPSS
Процентиль: 89%
0.04874
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other