First published: Sat Dec 31 2005(Updated: )
Heap-based buffer overflow in bogofilter 0.96.2, 0.95.2, 0.94.14, 0.94.12, and other versions from 0.93.5 to 0.96.2, when using Unicode databases, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "invalid input sequences" that lead to heap corruption when bogofilter or bogolexer converts character sets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
bogofilter | =0.94.12 | |
bogofilter | =0.93.5 | |
bogofilter | =0.96.2 | |
bogofilter | =0.94.14 | |
bogofilter | =0.95.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4591 has a high severity due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2005-4591, upgrade to a version of Bogofilter that is not affected, such as versions after 0.96.2.
CVE-2005-4591 affects Bogofilter versions from 0.93.5 to 0.96.2.
CVE-2005-4591 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2005-4591 can be exploited remotely through the use of invalid input sequences.