Multiple stack-based buffer overflows in Tumbleweed Email Firewall (EMF) allow remote attackers to execute arbitrary code via an email attachment with an LHA archive that contains a (1) file or (2) directory with a long LHA extended header, (3) an LHA archive in which the "temporary pathname" field for decompressed output is greater than 2 bytes, or (4) an LHA archive with a long filename.
References
Configurations
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=full-disclosure&m=115378437918939&w=2 - | |
References | () http://secunia.com/advisories/21194 - Vendor Advisory | |
References | () http://www.hustlelabs.com/advisories/04072006_tweed.pdf - Vendor Advisory | |
References | () http://www.osvdb.org/27495 - | |
References | () http://www.securityfocus.com/archive/1/441497/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19146 - | |
References | () http://www.vupen.com/english/advisories/2006/2970 - |
Information
Published : 2006-07-27 11:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3901
Mitre link : CVE-2006-3901
CVE.ORG link : CVE-2006-3901
JSON object : View
Products Affected
tumbleweed
- mailgate_email_firewall
CWE