First published: Fri Dec 31 2004(Updated: )
Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Inter7 Vpopmail Vchkpw | =3.4.11e | |
Inter7 Vpopmail Vchkpw | =3.4.1 | |
Inter7 Vpopmail Vchkpw | =5.2.1 | |
Inter7 Vpopmail Vchkpw | =4.9.10 | |
Inter7 Vpopmail Vchkpw | =5.3.30 | |
Inter7 Vpopmail Vchkpw | =3.4.6 | |
Inter7 Vpopmail Vchkpw | =3.4.11 | |
Inter7 Vpopmail Vchkpw | =3.4.2 | |
Inter7 Vpopmail Vchkpw | =4.10 | |
Inter7 Vpopmail Vchkpw | =3.4.10 | |
Inter7 Vpopmail Vchkpw | =4.9 | |
Inter7 Vpopmail Vchkpw | =3.4.8 | |
Inter7 Vpopmail Vchkpw | =4.6 | |
Inter7 Vpopmail Vchkpw | =5.3.28 | |
Inter7 Vpopmail Vchkpw | =5.3.27 | |
Inter7 Vpopmail Vchkpw | =5.3.22 | |
Inter7 Vpopmail Vchkpw | =5.3.21 | |
Inter7 Vpopmail Vchkpw | =5.3.26 | |
Inter7 Vpopmail Vchkpw | =5.4 | |
Inter7 Vpopmail Vchkpw | =3.4.5 | |
Inter7 Vpopmail Vchkpw | =4.7 | |
Inter7 Vpopmail Vchkpw | =3.4.9 | |
Inter7 Vpopmail Vchkpw | =5.3.29 | |
Inter7 Vpopmail Vchkpw | =3.4.7 | |
Inter7 Vpopmail Vchkpw | =5.4.1 | |
Inter7 Vpopmail Vchkpw | =5.3.24 | |
Inter7 Vpopmail Vchkpw | =5.3.23 | |
Inter7 Vpopmail Vchkpw | =5.3.25 | |
Inter7 Vpopmail Vchkpw | =3.4.3 | |
Inter7 Vpopmail Vchkpw | =4.8 | |
Inter7 Vpopmail Vchkpw | =5.3.20 | |
Inter7 Vpopmail Vchkpw | =3.4.4 | |
Inter7 Vpopmail Vchkpw | =5.4.2 | |
Inter7 Vpopmail Vchkpw | =4.5 | |
Inter7 Vpopmail Vchkpw | =5.2.2 | |
Inter7 Vpopmail Vchkpw | =3.4.1 | |
Inter7 Vpopmail Vchkpw | =3.4.2 | |
Inter7 Vpopmail Vchkpw | =3.4.3 | |
Inter7 Vpopmail Vchkpw | =3.4.4 | |
Inter7 Vpopmail Vchkpw | =3.4.5 | |
Inter7 Vpopmail Vchkpw | =3.4.6 | |
Inter7 Vpopmail Vchkpw | =3.4.7 | |
Inter7 Vpopmail Vchkpw | =3.4.8 | |
Inter7 Vpopmail Vchkpw | =3.4.9 | |
Inter7 Vpopmail Vchkpw | =3.4.10 | |
Inter7 Vpopmail Vchkpw | =3.4.11 | |
Inter7 Vpopmail Vchkpw | =3.4.11e | |
Inter7 Vpopmail Vchkpw | =4.5 | |
Inter7 Vpopmail Vchkpw | =4.6 | |
Inter7 Vpopmail Vchkpw | =4.7 | |
Inter7 Vpopmail Vchkpw | =4.8 | |
Inter7 Vpopmail Vchkpw | =4.9 | |
Inter7 Vpopmail Vchkpw | =4.9.10 | |
Inter7 Vpopmail Vchkpw | =4.10 | |
Inter7 Vpopmail Vchkpw | =5.2.1 | |
Inter7 Vpopmail Vchkpw | =5.2.2 | |
Inter7 Vpopmail Vchkpw | =5.3.20 | |
Inter7 Vpopmail Vchkpw | =5.3.21 | |
Inter7 Vpopmail Vchkpw | =5.3.22 | |
Inter7 Vpopmail Vchkpw | =5.3.23 | |
Inter7 Vpopmail Vchkpw | =5.3.24 | |
Inter7 Vpopmail Vchkpw | =5.3.25 | |
Inter7 Vpopmail Vchkpw | =5.3.26 | |
Inter7 Vpopmail Vchkpw | =5.3.27 | |
Inter7 Vpopmail Vchkpw | =5.3.28 | |
Inter7 Vpopmail Vchkpw | =5.3.29 | |
Inter7 Vpopmail Vchkpw | =5.3.30 | |
Inter7 Vpopmail Vchkpw | =5.4 | |
Inter7 Vpopmail Vchkpw | =5.4.1 | |
Inter7 Vpopmail Vchkpw | =5.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2239 is classified as a buffer overflow vulnerability that may allow attackers to execute arbitrary code or induce a denial of service.
To fix CVE-2004-2239, it is recommended to upgrade to a version of vpopmail that is newer than 5.4.2.
CVE-2004-2239 affects vpopmail versions 5.4.2 and earlier.
CVE-2004-2239 can allow attackers to exploit the vulnerability to execute malicious code or disrupt service.
While upgrading is the primary solution, implementing network-level protections or access controls may help mitigate the risk of CVE-2004-2239.