|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:303|
The remote host is missing updates announced in
Sylpheed is a GTK+ based fast email client.
A buffer overflow bug has been found in the way Sylpheed handles non-ASCII
characters in the header of a message to which a victim replies. A
carefully crafted email message could potentially allow an attacker to
execute arbitrary code on a victim's machine if they reply to such a
message. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2005-0667 to this issue.
Users of Sylpheed should upgrade to this updated package, which contains a
backported patch, and is not vulnerable to this issue.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2005-0667|
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.