First published: Sun Nov 20 2005(Updated: )
Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sylpheed | =0.9.10 | |
Sylpheed | =2.1.2 | |
Sylpheed | =1.0.0 | |
Sylpheed | =2.0 | |
Sylpheed | =0.9.11 | |
Sylpheed | =0.9.5 | |
Sylpheed | =2.0.1 | |
Sylpheed | =0.8.11 | |
Sylpheed | =2.0.2 | |
Sylpheed | =2.1.1 | |
Sylpheed | =0.9.4 | |
Sylpheed | =2.1.3 | |
Sylpheed | =1.0.4 | |
Sylpheed | =1.0.3 | |
Sylpheed | =2.1.5 | |
Sylpheed | =0.9.8 | |
Sylpheed | =1.0.1 | |
Sylpheed | =2.1.4 | |
Sylpheed | =0.9.12 | |
Sylpheed | =0.9.7 | |
Sylpheed | =1.0.2 | |
Sylpheed | =2.0.3 | |
Sylpheed | =2.1 | |
Sylpheed | =0.9.6 | |
Sylpheed | =0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3354 is considered to have a high severity due to the potential for arbitrary code execution.
To fix CVE-2005-3354, upgrade to Sylpheed version 2.1.6 or later, which addresses this vulnerability.
CVE-2005-3354 is a stack-based buffer overflow vulnerability.
CVE-2005-3354 affects multiple versions of Sylpheed including versions from 0.8.11 to 2.1.5.
CVE-2005-3354 requires user interaction to exploit, as it involves importing malicious LDIF files locally.