Vulnerability Details : CVE-2005-1523
Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via format string specifiers in the command tag for IMAP commands.
Vulnerability category: Execute code
Products affected by CVE-2005-1523
- cpe:2.3:a:gnu:mailutils:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailutils:0.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1523
82.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1523
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-1523
-
http://www.securityfocus.com/bid/13764
Patch
-
http://www.debian.org/security/2005/dsa-732
[SECURITY] [DSA 732-1] New mailutils packages fix several vulnerabilities
-
http://securitytracker.com/id?1014052
GoDaddy Domain Name Search
-
http://www.idefense.com/application/poi/display?id=246&type=vulnerabilities
U.S. | Let There Be Change | AccenturePatch
Jump to