Описание
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.3.bl.3.dfsg-9 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [3.3.bl.3.dfsg-8+deb7u1build0.14.04.1]] |
| lucid | ignored | end of life |
| precise | released | 3.3.bl.3.dfsg-8+deb7u1build0.12.04.1 |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | released | 3.3.bl.3.dfsg-8+deb7u1build0.14.04.1 |
| trusty/esm | DNE | trusty was released [3.3.bl.3.dfsg-8+deb7u1build0.14.04.1] |
| upstream | released | 3.3.bl.3.dfsg-9 |
| utopic | not-affected | 3.3.bl.3.dfsg-9 |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Stack-based buffer overflow in a certain Debian patch for xbuffy befor ...
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2