Buffer overflow in Convert-UUlib (Convert::UUlib) prior to 1.051 allows remote malicious users to execute arbitrary code via a malformed parameter to a read operation.
Mark Martinec and Robert Lewis discovered a buffer overflow in
Convert::UUlib, a Perl interface to the uulib library, which may
result in the execution of arbitrary code
For the stable distribution (woody) this problem has been fixed in
version 0201-2woody1
For the testing (sarge) and unstable (sid) distributions this problem
has been fixed in v ...
source: wwwsecurityfocuscom/bid/13401/info
Convert-UUlib Perl module is prone to a remotely exploitable buffer-overflow vulnerability
A remote attacker may leverage this condition to overwrite sensitive program control variables and thus gain control of the process's execution flow
This BID will be updated as soon as further informati ...