First published: Wed May 07 2003(Updated: )
Integer signedness errors in the POP3 client for Mirabilis ICQ Pro 2003a allow remote attackers to execute arbitrary code via the (1) Subject or (2) Date headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CenterICQ | =2001b_build3636 | |
CenterICQ | =2003a_build3777 | |
CenterICQ | =99a_2.21build1800 | |
CenterICQ | =2002a_build3722 | |
CenterICQ | =99a_2.15build1701 | |
CenterICQ | =2001a | |
CenterICQ | =2002a_build3727 | |
CenterICQ | =2003a_build3799 | |
CenterICQ | =2001b_build3638 | |
CenterICQ | =2000.0a | |
CenterICQ | =2001b_build3659 | |
CenterICQ | =2000.0b_build3278 | |
CenterICQ | =2003a_build3800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0236 is considered critical as it allows remote attackers to execute arbitrary code through signed integer errors.
To fix CVE-2003-0236, you should update your Mirabilis ICQ software to the latest version that has patched this vulnerability.
CVE-2003-0236 affects multiple versions including ICQ 2001a, 2001b, 2002a, 2003a, and others prior to the patch release.
CVE-2003-0236 is classified as an integer signedness error vulnerability.
Yes, CVE-2003-0236 can be exploited remotely through manipulated Subject or Date headers.