ID CVE-2007-2958
Summary Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
References
Vulnerable Configurations
  • cpe:2.3:a:sylpheed:sylpheed:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:sylpheed:sylpheed:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:sylpheed-claws:sylpheed-claws:1.9.100:*:*:*:*:*:*:*
    cpe:2.3:a:sylpheed-claws:sylpheed-claws:1.9.100:*:*:*:*:*:*:*
  • cpe:2.3:a:sylpheed-claws:sylpheed-claws:2.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:sylpheed-claws:sylpheed-claws:2.10.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 25430
confirm http://bugs.gentoo.org/show_bug.cgi?id=190104
fedora FEDORA-2007-2009
gentoo GLSA-200710-29
misc
osvdb 40184
secunia
  • 26550
  • 26610
  • 27229
  • 27379
suse SUSE-SR:2007:020
vupen ADV-2007-2971
xf sylpheed-incputerror-format-string(36238)
statements via4
contributor Mark J Cox
lastmodified 2007-08-28
organization Red Hat
statement Not vulnerable. This issue did not affect version of Sylpheed as shipped with Red Hat Enterprise Linux 2.1. Sylpheed and claws-mail are not shipped with Red Hat Enterprise Linux 3, 4, or 5.
Last major update 29-07-2017 - 01:31
Published 27-08-2007 - 17:17
Last modified 29-07-2017 - 01:31
Back to Top