Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Emacs | Gnu | * | 20.0 (including) |
Emacs | Gnu | 21.3 (including) | 21.3 (including) |
Xemacs | Gnu | * | 21.4 (including) |
Emacs21 | Ubuntu | dapper | * |
Emacs21 | Ubuntu | devel | * |
Emacs21 | Ubuntu | edgy | * |
Emacs21 | Ubuntu | feisty | * |
Xemacs21 | Ubuntu | dapper | * |
Xemacs21 | Ubuntu | devel | * |
Xemacs21 | Ubuntu | edgy | * |
Xemacs21 | Ubuntu | feisty | * |
Red Hat Enterprise Linux 3 | RedHat | emacs-0:21.3-4.1 | * |
Red Hat Enterprise Linux 3 | RedHat | xemacs-0:21.4.13-8.ent.1 | * |
Red Hat Enterprise Linux 4 | RedHat | emacs-0:21.3-19.EL.1 | * |
Red Hat Enterprise Linux 4 | RedHat | xemacs-0:21.4.15-10.EL.1 | * |