CVE-2005-2943
Published Oct 13, 2005
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in sendmail in XMail before 1.22 allows remote attackers to execute arbitrary code via a long -t command line option.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86CC05D-62C9-4F9B-AFA8-C0CF8C00DEF0" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "918A0DB1-2FE6-4FC1-B957-3FFE60263A76" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C99D1C6-E73D-4FAD-872C-FB7CD5CBE48D" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90EC3FFB-812A-4440-BEFB-4D2B67AC37AC" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F12CBC28-D23A-483B-829A-B11423D9F18F" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C259E51-4DF4-4D0C-9AB4-F3840DA75D28" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39668C04-DFAA-4152-9A8D-74C900C96FF6" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A7B9A4-B6A4-457C-AB14-22E900D85163" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C81EF987-4610-4F52-9B7D-02ABC6E85B1D" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB98F9FF-49A7-433F-8CA2-D842E10D3201" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65EFD68C-A7E9-4371-AB84-CB08973E2659" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B119C7BC-038E-458F-8C54-6B0C83EF6B1D" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1597610A-0824-4CC7-B969-08ADA89B7476" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CB7001A-D790-4995-92CD-45E1CA8E6EE8" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF1E0252-304E-4835-9614-EFE1A58E9BB6" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824D8F15-E510-414E-A08B-C6141E0D0506" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5B8987C-A1E3-4F86-8264-5C23F182BF40" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA54C747-8E09-4E41-9CE6-F5F7E83F49FC" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F6F7FBA-9809-4D36-9173-987B801F9774" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08D694FB-3E98-46F0-8096-479206CDF8FD" }, { "criteria": "cpe:2.3:a:davide_libenzi:xmail:1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86BB0A56-D579-45ED-8D16-03670BB53E54" } ], "operator": "OR" } ] } ]