[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2012-0802Date: (C)2012-06-19   (M)2018-02-19


Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-47548
SECUNIA-48257
BID-51440
OSVDB-78351
GLSA-201203-01
http://www.openwall.com/lists/oss-security/2012/01/23/5
http://www.mail-archive.com/spamdyke-release@spamdyke.org/msg00014.html
http://www.spamdyke.org/documentation/Changelog.txt

CPE    33
cpe:/a:spamdyke:spamdyke:3.1.4
cpe:/a:spamdyke:spamdyke:3.1.5
cpe:/a:spamdyke:spamdyke:3.1.2
cpe:/a:spamdyke:spamdyke:3.1.3
...
CWE    1
CWE-119

© SecPod Technologies