First published: Tue Mar 16 2004(Updated: )
Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Courier-IMAP | =2.2.1 | |
Courier-IMAP | =2.1.2 | |
Courier MTA | =0.43.2 | |
Courier-IMAP | =2.1.1 | |
Courier MTA | =0.43 | |
Courier MTA | =0.43.1 | |
Courier-IMAP | =1.7 | |
double precision incorporated SqWebMail | =3.5.2 | |
Courier MTA | =0.44.2 | |
double precision incorporated SqWebMail | =3.6.1 | |
double precision incorporated SqWebMail | =3.5.3 | |
double precision incorporated SqWebMail | =3.6_.0 | |
Courier MTA | =0.44 | |
double precision incorporated SqWebMail | =3.6.2 | |
Courier-IMAP | =2.2.0 | |
Courier-IMAP | =1.6 | |
Courier-IMAP | =2.0.0 | |
Courier-IMAP | =2.1 | |
Gentoo Linux | =1.4-rc1 | |
Gentoo Linux | =1.4-rc3 | |
Gentoo Linux | =1.4 | |
Gentoo Linux | =1.4-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0224 has a critical severity level due to potential arbitrary code execution.
To fix CVE-2004-0224, upgrade to a version of Courier-IMAP, Courier MTA, or SqWebMail that is 3.0.0 or later.
CVE-2004-0224 affects multiple versions of Courier-IMAP, Courier MTA, and SqWebMail before their respective secure versions.
Yes, CVE-2004-0224 can be exploited remotely by attackers sending specially crafted Unicode characters.
The potential impacts of CVE-2004-0224 include execution of arbitrary code and possible system compromise.