First published: Fri Sep 12 2003(Updated: )
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington PINE | =3.98 | |
University of Washington PINE | =4.0.2 | |
University of Washington PINE | =4.0.4 | |
University of Washington PINE | =4.10 | |
University of Washington PINE | =4.20 | |
University of Washington PINE | =4.21 | |
University of Washington PINE | =4.30 | |
University of Washington PINE | =4.33 | |
University of Washington PINE | =4.44 | |
University of Washington PINE | =4.50 | |
University of Washington PINE | =4.52 | |
University of Washington PINE | =4.53 | |
University of Washington PINE | =4.56 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0720 is classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2003-0720, upgrade to PINE version 4.58 or later.
CVE-2003-0720 affects PINE versions prior to 4.58, including versions 3.98 and 4.0.x through 4.56.
Any users of the vulnerable versions of PINE who handle maliciously crafted email could be impacted by CVE-2003-0720.
Yes, CVE-2003-0720 can be exploited remotely through a malformed message/external-body MIME type.