CVE-2012-5468
Published Dec 18, 2012
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in iconvert.c in the bogolexer component in Bogofilter before 1.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an email containing a base64 string that is decoded to incomplete multibyte characters.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A686DFB4-6B82-45EA-9C1F-6492328A5EE0", "versionEndIncluding": "1.2.2" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "679A1651-AB06-457C-85DC-7CCA5C02B923" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B38F3AD-628D-4959-9A9D-FEC84B4B5C83" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B6F5D1A-3C2A-4BCB-9FDA-9A27FF4596A8" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4D18AAD-4458-4F96-8DEE-5D413B3DA637" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70B4CC62-DF0A-43D3-B52E-6F25B446CBCE" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1E4BDE3-1774-4C0A-B259-834A7CF07F4F" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D76403F-1611-43AB-9C61-71FE0AB525A6" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E9B3D29-D5C8-43BC-8C56-2892E8BD9E95" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EA0827D-3C0A-403C-95DD-5CC8DD21715E" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "191F1EAA-890F-41B3-9A1D-935FB88F9D4F" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7613C481-B90C-4AE0-8972-AD20CE4F6C76" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2463E3C5-C6AA-4DB6-B9B9-D79C3D6AC027" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37AEF261-7622-4927-A14D-6A6A59F5BCBB" }, { "criteria": "cpe:2.3:a:bogofilter_project:bogofilter:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B156D8BA-483B-4FC0-B24E-8AC65A248B87" } ], "operator": "OR" } ] } ]