First published: Fri Aug 24 2007(Updated: )
Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/3.0.0 | <1. | 1. |
Claws-Mail | =1.9.100 | |
Claws-Mail | =2.10.0 | |
Sylpheed | =2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2958 is considered to have a high severity as it allows remote execution of arbitrary code.
To fix CVE-2007-2958, update to Sylpheed version 2.4.5 or later, and Sylpheed-Claws versions 1.9.101 and 2.10.1 or later.
CVE-2007-2958 affects Sylpheed 2.4.4, Sylpheed-Claws 1.9.100, and 2.10.0.
Yes, CVE-2007-2958 can be exploited remotely via crafted replies from POP3 servers.
CVE-2007-2958 was discovered by Ulf Harnhammar from Secunia Research.