CVE-2005-1521
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/05/2005
Last modified:
03/04/2025
Description
Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:mailutils:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailutils:0.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/15442
- http://securitytracker.com/id?1014052=
- http://www.debian.org/security/2005/dsa-732
- http://www.idefense.com/application/poi/display?id=248&type=vulnerabilities
- http://www.securityfocus.com/bid/13763
- http://secunia.com/advisories/15442
- http://securitytracker.com/id?1014052=
- http://www.debian.org/security/2005/dsa-732
- http://www.idefense.com/application/poi/display?id=248&type=vulnerabilities
- http://www.securityfocus.com/bid/13763



