First published: Mon May 05 2014(Updated: )
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Xbuffy | <=3.3.bl.3.dfsg-8 | |
Debian Xbuffy | =3.2.1-1 | |
Debian Xbuffy | =3.2.1-2 | |
Debian Xbuffy | =3.2.1-3 | |
Debian Xbuffy | =3.2.1-4 | |
Debian Xbuffy | =3.3-1 | |
Debian Xbuffy | =3.3.b1.3-4 | |
Debian Xbuffy | =3.3.bl.2-1 | |
Debian Xbuffy | =3.3.bl.3-1 | |
Debian Xbuffy | =3.3.bl.3-2 | |
Debian Xbuffy | =3.3.bl.3-3 | |
Debian Xbuffy | =3.3.bl.3-5 | |
Debian Xbuffy | =3.3.bl.3-6 | |
Debian Xbuffy | =3.3.bl.3-7 | |
Debian Xbuffy | =3.3.bl.3-8 | |
Debian Xbuffy | =3.3.bl.3-9 | |
Debian Xbuffy | =3.3.bl.3-10 | |
Debian Xbuffy | =3.3.bl.3-11 | |
Debian Xbuffy | =3.3.bl.3-12 | |
Debian Xbuffy | =3.3.bl.3-13 | |
Debian Xbuffy | =3.3.bl.3-14 | |
Debian Xbuffy | =3.3.bl.3-15 | |
Debian Xbuffy | =3.3.bl.3-16 | |
Debian Xbuffy | =3.3.bl.3-17 | |
Debian Xbuffy | =3.3.bl.3-18 | |
Debian Xbuffy | =3.3.bl.3-19 | |
Debian Xbuffy | =3.3.bl.3-20 | |
Debian Xbuffy | =3.3.bl.3-21 | |
Debian Xbuffy | =3.3.bl.3-22 | |
Debian Xbuffy | =3.3.bl.3-23 | |
Debian Xbuffy | =3.3.bl.3-24 | |
Debian Xbuffy | =3.3.bl.3-25 | |
Debian Xbuffy | =3.3.bl.3.dfsg-1 | |
Debian Xbuffy | =3.3.bl.3.dfsg-2 | |
Debian Xbuffy | =3.3.bl.3.dfsg-3 | |
Debian Xbuffy | =3.3.bl.3.dfsg-4 | |
Debian Xbuffy | =3.3.bl.3.dfsg-5 | |
Debian Xbuffy | =3.3.bl.3.dfsg-6 | |
Debian Xbuffy | =3.3.bl.3.dfsg-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.