[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-0802Date: (C)2012-06-19   (M)2023-12-22


Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-47548
SECUNIA-48257
BID-51440
OSVDB-78351
GLSA-201203-01
http://www.openwall.com/lists/oss-security/2012/01/23/5
http://www.mail-archive.com/spamdyke-release%40spamdyke.org/msg00014.html
http://www.spamdyke.org/documentation/Changelog.txt

CPE    32
cpe:/a:spamdyke:spamdyke:4.0.5:beta3
cpe:/a:spamdyke:spamdyke:4.0.5:beta4
cpe:/a:spamdyke:spamdyke:4.2.0
cpe:/a:spamdyke:spamdyke:4.0.2
...
CWE    1
CWE-119

© SecPod Technologies