Description
Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-0831 | Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-17T04:20:13.378Z
Reserved: 2012-01-19T00:00:00.000Z
Link: CVE-2012-0802
No data.
Status : Deferred
Published: 2012-06-19T20:55:05.113
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0802
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD