First published: Mon Feb 07 2005(Updated: )
Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=20.0 | |
GNU Emacs | =21.3 | |
XEmacs | <=21.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0100 is considered to have a high severity level due to the potential for arbitrary code execution.
To mitigate CVE-2005-0100, upgrade to a patched version of Emacs or XEmacs that resolves the format string vulnerability.
CVE-2005-0100 affects GNU Emacs versions 20.x, 21.3 and XEmacs versions up to and including 21.4.
A format string vulnerability allows an attacker to manipulate the format string used in functions, potentially leading to arbitrary code execution.
No, CVE-2005-0100 is primarily an issue exploited through remote malicious POP3 servers.