Format string vulnerability in qwik-smtpd.c in QwikMail SMTP (qwik-smtpd) 0.3 and earlier allows remote attackers to execute arbitrary code via format specifiers in the (1) clientRcptTo array, and the (2) Received and (3) messageID variables, possibly involving HELO and hostname arguments.
References
| Link | Resource |
|---|---|
| http://unl0ck.info/advisories/qwik-smtpd.txt | |
| http://qwikmail.sourceforge.net/smtpd/qwik-smtpd-0.3.patch | Patch |
| http://www.securityfocus.com/bid/11572 | Exploit Patch Vendor Advisory |
| http://securitytracker.com/id?1012016 | Patch Vendor Advisory |
| http://secunia.com/advisories/13037 | Patch Vendor Advisory |
| http://www.vupen.com/english/advisories/2007/0687 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/17917 | |
| http://www.securityfocus.com/archive/1/460600/100/0/threaded |
Configurations
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2018-10-19 15:30
NVD link : CVE-2004-2677
Mitre link : CVE-2004-2677
JSON object : View
Products Affected
qwikmail
- qwikmail_smtp
CWE
