Multiple stack-based and heap-based buffer overflows in EnderUNIX spamGuard before 1.7-BETA allow remote attackers to execute arbitrary code via the (1) qmail_parseline and (2) sendmail_parseline functions in parser.c, (3) loadconfig and (4) removespaces functions in loadconfig.c, and possibly (5) unspecified functions in functions.c.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Spamguard | Enderunix_software | 1.6 (including) | 1.6 (including) |