First published: Thu May 26 2005(Updated: )
Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailutils | =0.6 | |
GNU Mailutils | =0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1521 is considered critical due to the potential for remote code execution.
To fix CVE-2005-1521, upgrade to GNU Mailutils version 0.6.90 or later.
CVE-2005-1521 affects GNU Mailutils versions 0.5, 0.6, and earlier versions before 0.6.90.
CVE-2005-1521 is an integer overflow vulnerability that can lead to a heap-based buffer overflow.
Yes, CVE-2005-1521 can be exploited remotely by sending crafted requests to the imap4d server.