7.5
CWE
NVD-CWE-Other 119
Advisory Published
CVE Published
Updated

CVE-2000-0847: Buffer Overflow

First published: Tue Nov 14 2000(Updated: )

Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
University of Washington c-client=4.7c
University of Washington PINE=4.21
University of Washington PINE=4.20
University of Washington c-client=4.7b

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2000-0847?

    CVE-2000-0847 is considered a critical vulnerability due to its potential for remote command execution.

  • How do I fix CVE-2000-0847?

    To mitigate CVE-2000-0847, update the University of Washington c-client library and affected programs to versions that have addressed this vulnerability.

  • Which software is affected by CVE-2000-0847?

    CVE-2000-0847 affects University of Washington's c-client library and the Pine email client versions 4.20, 4.21, and specific versions of IMAP.

  • What kind of attack does CVE-2000-0847 enable?

    CVE-2000-0847 enables remote attackers to execute arbitrary commands through a buffer overflow when a specially crafted X-Keywords header is sent.

  • When was CVE-2000-0847 reported?

    CVE-2000-0847 was reported in the year 2000, during a time when buffer overflow vulnerabilities were commonly exploited.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203