Vulnerability Description
Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spamdyke | Spamdyke | <= 4.2.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/47548Vendor Advisory
- http://secunia.com/advisories/48257Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201203-01.xml
- http://www.mail-archive.com/spamdyke-release%40spamdyke.org/msg00014.html
- http://www.openwall.com/lists/oss-security/2012/01/23/5
- http://www.osvdb.org/78351
- http://www.securityfocus.com/bid/51440
- http://www.spamdyke.org/documentation/Changelog.txt
- http://secunia.com/advisories/47548Vendor Advisory
- http://secunia.com/advisories/48257Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201203-01.xml
- http://www.mail-archive.com/spamdyke-release%40spamdyke.org/msg00014.html
- http://www.openwall.com/lists/oss-security/2012/01/23/5
- http://www.osvdb.org/78351
- http://www.securityfocus.com/bid/51440
FAQ
What is CVE-2012-0802?
CVE-2012-0802 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the re...
How severe is CVE-2012-0802?
CVE-2012-0802 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0802?
Check the references section above for vendor advisories and patch information. Affected products include: Spamdyke Spamdyke.