5.1
CVSSv2

CVE-2005-0667

Published: 07/03/2005 Updated: 05/09/2008
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Sylpheed prior to 1.0.3 and other versions prior to 1.9.5 allows remote malicious users to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.

Vulnerable Product Search on Vulmon Subscribe to Product

sylpheed sylpheed 0.9.6

sylpheed sylpheed 0.9.7

sylpheed sylpheed 0.9.8

sylpheed sylpheed 0.9.9

sylpheed sylpheed 0.9.10

sylpheed sylpheed 0.9.12

sylpheed sylpheed 0.9.5

sylpheed sylpheed 0.9.99

sylpheed sylpheed 1.0.1

sylpheed-claws sylpheed-claws 1.0.2

sylpheed sylpheed 0.8.11

sylpheed sylpheed 0.9.11

sylpheed sylpheed 0.9.4

sylpheed sylpheed 1.0.0

sylpheed sylpheed 1.0.2

redhat enterprise linux 2.1

redhat fedora core core_3.0

redhat linux advanced workstation 2.1

altlinux alt linux 2.3

gentoo linux

Vendor Advisories

Synopsis sylpheed security update Type/Severity Security Advisory: Important Topic An updated sylpheed package that fixes a buffer overflow issue is nowavailableThis update has been rated as having important security impact by the RedHat Security Response Team Description Sylpheed is a GT ...