CVE-2012-0802

critical

Description

Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.

References

http://www.spamdyke.org/documentation/Changelog.txt

http://www.securityfocus.com/bid/51440

http://www.osvdb.org/78351

http://www.openwall.com/lists/oss-security/2012/01/23/5

http://www.mail-archive.com/spamdyke-release%40spamdyke.org/msg00014.html

http://security.gentoo.org/glsa/glsa-201203-01.xml

http://secunia.com/advisories/48257

http://secunia.com/advisories/47548

Details

Source: Mitre, NVD

Published: 2012-06-19

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical