From 1aa7bbb219a3d7c09cc9081e18ca1d8c6b257789 Mon Sep 17 00:00:00 2001 From: "Simon L. B. Nielsen" Date: Sun, 13 Feb 2005 23:19:00 +0000 Subject: [PATCH] Document format string vulnerability in the Emacs movemail utility. --- security/vuxml/vuln.xml | 53 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 77f8307b78b5..c874f848559e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,59 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + emacs -- movemail format string vulnerability + + + zh-emacs + emacs + 20.7_4 + 21.*21.4 + + + xemacs + xemacs-mule + zh-xemacs + zh-xemacs-mule + 21.4.17 + + + xemacs-devel + 21.5.b19,1 + + + xemacs-devel-21.5 + b11 + + + xemacs-devel-mule + 21.5.b19 + + + mule-common + hanemacs + 0 + + + + +

Max Vozeler discovered several format string + vulnerabilities in the movemail utility of Emacs. They can + be exploited when connecting to a malicious POP server and + can allow an attacker can execute arbitrary code under the + privileges of the user running Emacs.

+ +
+ + CAN-2005-0100 + 12462 + + + 2005-01-31 + 2005-02-14 + +
+ ngircd -- format string vulnerability