CVE-2005-0100

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
References
Link Resource
http://marc.info/?l=bugtraq&m=110780416112719&w=2
http://www.debian.org/security/2005/dsa-670 Patch Vendor Advisory
http://www.debian.org/security/2005/dsa-671 Patch Vendor Advisory
http://www.debian.org/security/2005/dsa-685 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:038
http://www.redhat.com/support/errata/RHSA-2005-110.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-112.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-133.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/433928/30/5010/threaded
http://www.securityfocus.com/bid/12462
https://exchange.xforce.ibmcloud.com/vulnerabilities/19246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408
http://marc.info/?l=bugtraq&m=110780416112719&w=2
http://www.debian.org/security/2005/dsa-670 Patch Vendor Advisory
http://www.debian.org/security/2005/dsa-671 Patch Vendor Advisory
http://www.debian.org/security/2005/dsa-685 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:038
http://www.redhat.com/support/errata/RHSA-2005-110.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-112.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-133.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/433928/30/5010/threaded
http://www.securityfocus.com/bid/12462
https://exchange.xforce.ibmcloud.com/vulnerabilities/19246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:xemacs:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=110780416112719&w=2 - () http://marc.info/?l=bugtraq&m=110780416112719&w=2 -
References () http://www.debian.org/security/2005/dsa-670 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-670 - Patch, Vendor Advisory
References () http://www.debian.org/security/2005/dsa-671 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-671 - Patch, Vendor Advisory
References () http://www.debian.org/security/2005/dsa-685 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-685 - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:038 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:038 -
References () http://www.redhat.com/support/errata/RHSA-2005-110.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-110.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-112.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-112.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-133.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-133.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/433928/30/5010/threaded - () http://www.securityfocus.com/archive/1/433928/30/5010/threaded -
References () http://www.securityfocus.com/bid/12462 - () http://www.securityfocus.com/bid/12462 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19246 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19246 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408 -

Information

Published : 2005-02-07 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0100

Mitre link : CVE-2005-0100

CVE.ORG link : CVE-2005-0100


JSON object : View

Products Affected

gnu

  • xemacs
  • emacs