Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument.

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.