[Forgot Password]
Login  Register Subscribe

23631

 
 

126173

 
 

98218

 
 

909

 
 

79224

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0802

Date: (C)2012-06-19   (M)2015-12-16 


Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
SECUNIA-47548
SECUNIA-48257
BID-51440
OSVDB-78351
GLSA-201203-01
http://www.openwall.com/lists/oss-security/2012/01/23/5
http://www.mail-archive.com/spamdyke-release@spamdyke.org/msg00014.html
http://www.spamdyke.org/documentation/Changelog.txt

CPE    33
cpe:/a:spamdyke:spamdyke:4.0.5:beta3
cpe:/a:spamdyke:spamdyke:4.0.5:beta4
cpe:/a:spamdyke:spamdyke:4.2.0
cpe:/a:spamdyke:spamdyke:4.0.2
...
CWE    1
CWE-119

© 2013 SecPod Technologies