From 6877b210a25291837a9c892a4c92ded37c9ec3a2 Mon Sep 17 00:00:00 2001 From: Neil McGovern Date: Tue, 4 Oct 2005 11:32:33 +0000 Subject: Created .adv git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2296 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- data/DTSA/advs/20-mailutils.adv | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 data/DTSA/advs/20-mailutils.adv (limited to 'data/DTSA/advs') diff --git a/data/DTSA/advs/20-mailutils.adv b/data/DTSA/advs/20-mailutils.adv new file mode 100644 index 0000000000..35fbd0edfd --- /dev/null +++ b/data/DTSA/advs/20-mailutils.adv @@ -0,0 +1,18 @@ +source: mailutils +date: October 4th, 2005 +author: Neil Mcgovern +vuln-type: Format string vulnerability +problem-scope: remote +debian-specifc: no +cve: CAN-2005-2878 +vendor-advisory: http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407 +testing-fix: 1:0.6.90-2.1etch1 +sid-fix: 1:0.6.90-3 +upgrade: apt-get install mailutils + +A ormat string vulnerability has been discovered in Mailutils. + +CAN-2005-2878 + A format string vulnerability in search.c in the imap4d server in GNU + Mailutils 0.6 allows remote authenticated users to execute arbitrary code via + format string specifiers in the SEARCH command. -- cgit v1.2.3