Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-906-1 | New sylpheed packages fix arbitrary code execution |
Debian DSA |
DSA-908-1 | New sylpheed-claws packages fix arbitrary code execution |
Debian DSA |
DSA-924-1 | New nbd packages fix potential arbitrary code execution |
EUVD |
EUVD-2005-3353 | Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines. |
Ubuntu USN |
USN-237-1 | nbd vulnerability |
Ubuntu USN |
USN-238-1 | Blender vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T23:10:07.772Z
Reserved: 2005-10-27T00:00:00
Link: CVE-2005-3354
No data.
Status : Deferred
Published: 2005-11-20T21:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-3354
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN