Vulnerability & Exploit Database

Displaying all 5 entries

Results for: CVE-2008-5514 Back to search

SUSE Linux Security Vulnerability: CVE-2008-5514 Vulnerability

  • Severity: 4
  • Published: December 23, 2008

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.

Gentoo Linux: CVE-2008-5514: UW IMAP toolkit: Multiple vulnerabilities Vulnerability

  • Severity: 4
  • Published: December 23, 2008

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.

FreeBSD: imap-uw -- local buffer overflow vulnerabilities (CVE-2008-5514) Vulnerability

  • Severity: 4
  • Published: December 23, 2008

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.

FreeBSD: imap-uw -- imap c-client buffer overflow (CVE-2008-5514) Vulnerability

  • Severity: 4
  • Published: December 23, 2008

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.

SUSE Linux Security Advisory: SUSE-SR:2009:001 Vulnerability

  • Severity: 10
  • Published: November 10, 2008

Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicod...