Lucene search

K
freebsdFreeBSDD9867F50-54D0-11DC-B80B-0016179B2DD5
HistoryAug 24, 2007 - 12:00 a.m.

claws-mail -- POP3 Format String Vulnerability

2007-08-2400:00:00
vuxml.freebsd.org
16

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.3%

A Secunia Advisory reports:

A format string error in the โ€œinc_put_error()โ€ function in
src/inc.c when displaying a POP3 serverโ€™s error response can
be exploited via specially crafted POP3 server replies containing
format specifiers.
Successful exploitation may allow execution of arbitrary code,
but requires that the user is tricked into connecting to a malicious
POP3 server.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchclaws-mail<ย 2.10.0_3UNKNOWN
FreeBSDanynoarchsylpheed-claws<ย 2.10.0_3UNKNOWN
FreeBSDanynoarchsylpheed2<ย 2.4.4_1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.3%