CVE-2014-0469
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0374 (3.7%)
Percentil: 88.1%
EPSS: 2026-05-06
Afecta
debian:xbuffyDescripción técnica
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Publicada: 5/5/2014, 16:07:05
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html
- http://www.debian.org/security/2014/dsa-2921
- http://www.openwall.com/lists/oss-security/2014/04/28/3
- http://www.securityfocus.com/bid/67090
- http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html
- http://www.debian.org/security/2014/dsa-2921
- http://www.openwall.com/lists/oss-security/2014/04/28/3
- http://www.securityfocus.com/bid/67090