First published: Tue Mar 16 2010(Updated: )
Buffer overflow in BarnOwl before 1.5.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted CC: header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | =1.0.5 | |
barnraiser AROUNDMe | =1.5-rc2 | |
barnraiser AROUNDMe | =1.0.2.1 | |
barnraiser AROUNDMe | =1.0.3 | |
barnraiser AROUNDMe | =1.4 | |
barnraiser AROUNDMe | =1.0.0 | |
barnraiser AROUNDMe | =1.3 | |
barnraiser AROUNDMe | =1.2 | |
barnraiser AROUNDMe | =1.0.4.1 | |
barnraiser AROUNDMe | =1.4-rc1 | |
barnraiser AROUNDMe | =1.1.1 | |
barnraiser AROUNDMe | <=1.5 | |
barnraiser AROUNDMe | =1.0.4 | |
barnraiser AROUNDMe | =1.5-rc1 | |
barnraiser AROUNDMe | =1.1 | |
barnraiser AROUNDMe | =1.0.2 | |
barnraiser AROUNDMe | =1.2.1 | |
barnraiser AROUNDMe | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0793 is classified as a high severity vulnerability due to its potential to cause a denial of service and possibly execute arbitrary code.
To fix CVE-2010-0793, upgrade BarnOwl to version 1.5.1 or later, which addresses the buffer overflow issue.
CVE-2010-0793 affects BarnOwl versions prior to 1.5.1, including 1.0.0 through 1.5-rc2.
CVE-2010-0793 facilitates remote denial of service attacks and may allow attackers to execute arbitrary code on vulnerable systems.
Yes, using BarnOwl version 1.5.1 and later is considered safe as it mitigates the vulnerabilities outlined in CVE-2010-0793.