Vulnerability Description
Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libspf | Libspf | 1.0.0_p4 |
References
- http://permalink.gmane.org/gmane.mail.spam.spf.devel/849Patch
- http://www.gossamer-threads.com/lists/spf/devel/27053?page=lastPatch
- http://www.libspf.org/index.htmlPatch
- http://www.vupen.com/english/advisories/2006/1846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26535
- http://permalink.gmane.org/gmane.mail.spam.spf.devel/849Patch
- http://www.gossamer-threads.com/lists/spf/devel/27053?page=lastPatch
- http://www.libspf.org/index.htmlPatch
- http://www.vupen.com/english/advisories/2006/1846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26535
FAQ
What is CVE-2006-1520?
CVE-2006-1520 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifier...
How severe is CVE-2006-1520?
CVE-2006-1520 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1520?
Check the references section above for vendor advisories and patch information. Affected products include: Libspf Libspf.