CVE-2010-0409
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
08/02/2010
Last modified:
11/04/2025
Description
Buffer overflow in the GMIME_UUENCODE_LEN macro in gmime/gmime-encodings.h in GMime before 2.4.15 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via input data for a uuencode operation.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnome:gmime:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gmime:2.4.13:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftp.gnome.org/pub/GNOME/sources/gmime/2.4/gmime-2.4.14-2.4.15.diff.gz
- http://ftp.gnome.org/pub/GNOME/sources/gmime/2.4/gmime-2.4.15.changes
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
- http://secunia.com/advisories/38459
- http://secunia.com/advisories/38915
- http://www.openwall.com/lists/oss-security/2010/02/03/2
- http://www.openwall.com/lists/oss-security/2010/02/03/4
- https://bugzilla.redhat.com/show_bug.cgi?id=561457
- http://ftp.gnome.org/pub/GNOME/sources/gmime/2.4/gmime-2.4.14-2.4.15.diff.gz
- http://ftp.gnome.org/pub/GNOME/sources/gmime/2.4/gmime-2.4.15.changes
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
- http://secunia.com/advisories/38459
- http://secunia.com/advisories/38915
- http://www.openwall.com/lists/oss-security/2010/02/03/2
- http://www.openwall.com/lists/oss-security/2010/02/03/4
- https://bugzilla.redhat.com/show_bug.cgi?id=561457



