First published: Fri Sep 12 2003(Updated: )
Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington PINE | <4.58 | |
University of Washington PINE | =4.0.2 | |
University of Washington PINE | =4.56 | |
University of Washington PINE | =4.50 | |
University of Washington PINE | =4.30 | |
University of Washington PINE | =4.21 | |
University of Washington PINE | =4.10 | |
University of Washington PINE | =3.98 | |
University of Washington PINE | =4.53 | |
University of Washington PINE | =4.52 | |
University of Washington PINE | =4.33 | |
University of Washington PINE | =4.44 | |
University of Washington PINE | =4.0.4 | |
University of Washington PINE | =4.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0721 has a high severity rating due to the potential for remote code execution.
To fix CVE-2003-0721, update PINE to version 4.58 or later.
PINE versions prior to 4.58, including 4.0.2, 4.56, 4.50, 4.30, 4.21, 4.10, 3.98, 4.53, 4.52, 4.33, 4.44, and 4.0.4, are affected by CVE-2003-0721.
Yes, CVE-2003-0721 can lead to data compromise through remote code execution if exploited.
If updating PINE is not an option, consider implementing network security measures such as email filtering and monitoring to mitigate the risk associated with CVE-2003-0721.