CVE-2014-0469
Published: 5 May 2014
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
Priority
Status
Package | Release | Status |
---|---|---|
xbuffy Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(3.3.bl.3.dfsg-8+deb7u1build0.12.04.1)
|
|
quantal |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Released
(3.3.bl.3.dfsg-8+deb7u1build0.14.04.1)
|
|
upstream |
Released
(3.3.bl.3.dfsg-9)
|
|
utopic |
Not vulnerable
(3.3.bl.3.dfsg-9)
|
|
vivid |
Not vulnerable
(3.3.bl.3.dfsg-9)
|