Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-0802

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2012-0802
Last Modified 20 Jun 2012 12:00:00
Published 19 Jun 2012 04:55:05
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2012-0802

Summary

Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.

Vulnerable Systems

Application

  • Spamdyke 3.0.0

  • Spamdyke 3.0.1

  • Spamdyke 3.1.0

  • Spamdyke 3.1.1

  • Spamdyke 3.1.2

  • Spamdyke 3.1.3

  • Spamdyke 3.1.4

  • Spamdyke 3.1.5

  • Spamdyke 3.1.6

  • Spamdyke 3.1.7

  • Spamdyke 3.1.8

  • Spamdyke 4.0.0

  • Spamdyke 4.0.1

  • Spamdyke 4.0.10

  • Spamdyke 4.0.2

  • Spamdyke 4.0.3

  • Spamdyke 4.0.4

  • Spamdyke 4.0.5

  • Spamdyke 4.0.6

  • Spamdyke 4.0.7

  • Spamdyke 4.0.8

  • Spamdyke 4.0.9

  • Spamdyke 4.1.0

  • Spamdyke 4.2.0

  • Spamdyke 4.2.1


References

CONFIRM - http://www.spamdyke.org/documentation/Changelog.txt

BID - 51440

OSVDB - 78351

MLIST - [oss-security] 20120123 Re: CVE request: spamdyke buffer overflow vulnerability

MLIST - [spamdyke-release] 20120115 New version: spamdyke 4.3.0

GENTOO - GLSA-201203-01

SECUNIA - 48257

SECUNIA - 47548


Last Updated: 27 May 2016 10:56:32