Vulnerability Description
Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| David Harris | Pegasus Mail | 4.21a |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/17992PatchVendor Advisory
- http://secunia.com/secunia_research/2005-61/advisory/Vendor Advisory
- http://securitytracker.com/id?1015385
- http://www.osvdb.org/21842
- http://www.pmail.com/newsflash.htm#secuniaPatchVendor Advisory
- http://www.securityfocus.com/archive/1/419908/100/0/threaded
- http://www.securityfocus.com/bid/15973
- http://www.vupen.com/english/advisories/2005/3004Vendor Advisory
- http://secunia.com/advisories/17992PatchVendor Advisory
- http://secunia.com/secunia_research/2005-61/advisory/Vendor Advisory
- http://securitytracker.com/id?1015385
- http://www.osvdb.org/21842
- http://www.pmail.com/newsflash.htm#secuniaPatchVendor Advisory
- http://www.securityfocus.com/archive/1/419908/100/0/threaded
- http://www.securityfocus.com/bid/15973
FAQ
What is CVE-2005-4444?
CVE-2005-4444 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
How severe is CVE-2005-4444?
CVE-2005-4444 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4444?
Check the references section above for vendor advisories and patch information. Affected products include: David Harris Pegasus Mail.