Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5005

Опубликовано: 10 нояб. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 10

Описание

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

ignored

end of life, was needed
hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

8:2007e~dfsg-3.1
gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

not-affected

8:2007b~dfsg-1.1
karmic

not-affected

8:2007b~dfsg-1.1build1
lucid

not-affected

8:2007e~dfsg-3.1
maverick

not-affected

8:2007e~dfsg-3.1
natty

not-affected

8:2007e~dfsg-3.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 90%
0.06194
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

nvd
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

debian
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

fstec
почти 11 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 90%
0.06194
Низкий

10 Critical

CVSS2