First published: Tue Feb 17 2009(Updated: )
Multiple buffer overflows in (a) BarnOwl before 1.0.5 and (b) owl 2.1.11 allow remote attackers to execute arbitrary code via vectors involving (1) a crafted zcrypt message, related to zcrypt.c; (2) a reply command on a message with a Zephyr Cc: list, related to zwrite.c; and unspecified other use of the products.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | =1.0.2.1 | |
barnraiser AROUNDMe | =1.0.3 | |
barnraiser AROUNDMe | <=1.0.4.1 | |
barnraiser AROUNDMe | =1.0.0 | |
barnraiser AROUNDMe | =1.0.4 | |
barnraiser AROUNDMe | =1.0.2 | |
barnraiser AROUNDMe | =1.0.1 | |
Ktools Owl | =2.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0363 has a high severity due to the potential for remote attackers to execute arbitrary code.
To fix CVE-2009-0363, upgrade BarnOwl to version 1.0.5 or later and Owl to version 2.1.12 or later.
CVE-2009-0363 affects BarnOwl versions before 1.0.5 and Owl version 2.1.11.
Yes, CVE-2009-0363 can be exploited remotely through crafted messages and commands.
Attack vectors for CVE-2009-0363 include a crafted zcrypt message and a reply command on a message with a Zephyr Cc: list.