CVE-2005-3354

Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sylpheed:sylpheed:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.0:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:sylpheed:sylpheed:2.1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://osvdb.org/20675 - () http://osvdb.org/20675 -
References () http://secunia.com/advisories/17492 - Vendor Advisory () http://secunia.com/advisories/17492 - Vendor Advisory
References () http://secunia.com/advisories/17525/ - Vendor Advisory () http://secunia.com/advisories/17525/ - Vendor Advisory
References () http://secunia.com/advisories/17540/ - Vendor Advisory () http://secunia.com/advisories/17540/ - Vendor Advisory
References () http://secunia.com/advisories/17678 - Vendor Advisory () http://secunia.com/advisories/17678 - Vendor Advisory
References () http://secunia.com/advisories/17831/ - Vendor Advisory () http://secunia.com/advisories/17831/ - Vendor Advisory
References () http://sylpheed.good-day.net/en/news.html - () http://sylpheed.good-day.net/en/news.html -
References () http://www.debian.org/security/2005/dsa-906 - () http://www.debian.org/security/2005/dsa-906 -
References () http://www.gentoo.org/security/en/glsa/glsa-200511-13.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200511-13.xml - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_28_sr.html - () http://www.novell.com/linux/security/advisories/2005_28_sr.html -
References () http://www.securityfocus.com/bid/15363 - () http://www.securityfocus.com/bid/15363 -
References () http://www.vupen.com/english/advisories/2005/2360 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2360 - Vendor Advisory
References () http://www.xatrix.org/advisory.php?s=7282 - () http://www.xatrix.org/advisory.php?s=7282 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23028 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23028 -

Information

Published : 2005-11-20 21:03

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3354

Mitre link : CVE-2005-3354

CVE.ORG link : CVE-2005-3354


JSON object : View

Products Affected

sylpheed

  • sylpheed
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer