First published: Thu May 15 2003(Updated: )
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Outlook Express | =6.00.2800.1106 | |
Mozilla Mozilla | =1.3 | |
Mozilla Mozilla | =1.4-alpha | |
Mutt Mutt | =1.4.1 | |
Qualcomm Eudora | =5.2.1 | |
GNOME Balsa | =2.0.10 | |
Sylpheed | =0.8.11 | |
University of Washington PINE | =4.53 | |
Ximian Evolution | =1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0300 is rated as a denial of service vulnerability, which can cause the affected IMAP clients to crash.
To fix CVE-2003-0300, users should update their IMAP clients to the latest version available that addresses this vulnerability.
CVE-2003-0300 affects versions of Sylpheed 0.8.11, Microsoft Outlook Express 6.00.2800.1106, Mozilla 1.3, Mutt 1.4.1, and several others.
CVE-2003-0300 allows remote malicious IMAP servers to exploit integer errors, leading to a denial of service attack.
As of now, there are no confirmed reports of active exploitation of CVE-2003-0300 in the wild, but users are advised to mitigate the risk.