Required CVE Record Information
Description
Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.
References 7 Total
- securitytracker.com: 1015391 vdb-entry
- vupen.com: ADV-2005-3005 vdb-entry
- seclists.org: 20051220 [ACSSEC-2005-11-27-0x1] Eudora Qualcomm WorldMail 3.0 IMAP4 Servi ce 6.1.19.0 mailing-list
- securityfocus.com: 15980 vdb-entry
- idefense.com: 20051220 Qualcomm WorldMail IMAP Server String Literal Processing Overflow Vulnerability third-party-advisory
- securityreason.com: 277 third-party-advisory
- secunia.com: 17640 third-party-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- securitytracker.com: 1015391 vdb-entryx_transferred
- vupen.com: ADV-2005-3005 vdb-entryx_transferred
- seclists.org: 20051220 [ACSSEC-2005-11-27-0x1] Eudora Qualcomm WorldMail 3.0 IMAP4 Servi ce 6.1.19.0 mailing-listx_transferred
- securityfocus.com: 15980 vdb-entryx_transferred
- idefense.com: 20051220 Qualcomm WorldMail IMAP Server String Literal Processing Overflow Vulnerability third-party-advisoryx_transferred
- securityreason.com: 277 third-party-advisoryx_transferred
- secunia.com: 17640 third-party-advisoryx_transferred