Vulnerability Details : CVE-2005-0100
Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
Vulnerability category: Execute code
Products affected by CVE-2005-0100
- cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:xemacs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0100
0.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0100
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-0100
-
http://www.debian.org/security/2005/dsa-670
[SECURITY] [DSA 670-1] New emacs20 packages fix arbitrary code executionPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:038
Mandriva
-
http://www.redhat.com/support/errata/RHSA-2005-133.html
SupportPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-110.html
SupportPatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/19246
-
http://marc.info/?l=bugtraq&m=110780416112719&w=2
'[USN-76-1] Emacs vulnerability' - MARC
-
http://www.securityfocus.com/archive/1/433928/30/5010/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408
404 Not Found
-
http://www.debian.org/security/2005/dsa-671
[SECURITY] [DSA 671-1] New xemacs21 packages fix arbitrary code executionPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-112.html
SupportPatch;Vendor Advisory
-
http://www.debian.org/security/2005/dsa-685
[SECURITY] [DSA 685-1] New emacs21 packages fix arbitrary code executionPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/12462
Jump to