First published: Thu May 26 2005(Updated: )
Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via format string specifiers in the command tag for IMAP commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailutils | =0.6 | |
GNU Mailutils | =0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1523 is considered to be a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2005-1523, update to GNU Mailutils version 0.6.90 or later, which addresses this vulnerability.
GNU Mailutils versions 0.5, 0.6, and earlier versions before 0.6.90 are affected by CVE-2005-1523.
CVE-2005-1523 is a format string vulnerability that can be exploited through IMAP commands.
Yes, CVE-2005-1523 can be exploited by remote attackers through specially crafted IMAP commands.