Required CVE Record Information
Description
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
References 4 Total
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 4 Total
- securityfocus.com: 67090 vdb-entryx_transferred
- debian.org: DSA-2921 vendor-advisoryx_transferred
- openwall.com: [oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing mailing-listx_transferred
- http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html x_transferred