Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-2878Use of Externally-Controlled Format String in Mailutils

8 documents6 sources
Severity
7.5HIGHNVD
EPSS
57.1%
top 1.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 13
Latest updateMay 1

Description

Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Debiangnu/mailutils< 1:0.6.90-3+3
NVDgnu/mailutils0.6

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6mvq-9mv3-ppcp: Format string vulnerability in search2022-05-01
CVEList
CVE-2005-2878: Format string vulnerability in search2005-09-13
OSV
CVE-2005-2878: Format string vulnerability in search2005-09-13

💥Exploits & PoCs

3
Exploit-DB
GNU Mailutils imap4d 0.6 - exec-shield Remote Format String2007-04-24
Exploit-DB
GNU Mailutils imap4d 0.6 (FreeBSD) - 'Search' Remote Format String2005-09-26
Exploit-DB
GNU Mailutils imap4d 0.6 - 'Search' Remote Format String2005-09-10

📋Vendor Advisories

1
Debian
CVE-2005-2878: mailutils - Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0....2005
CVE-2005-2878 — GNU Mailutils vulnerability | cvebase