|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: sylpheed, sylpheed-claws, sylpheed-gtk2|
|Summary:||FreeBSD Ports: sylpheed, sylpheed-claws, sylpheed-gtk2|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following packages are affected:
Buffer overflow in Sylpheed before 1.0.3 and other versions before
1.9.5 allows remote attackers to execute arbitrary code via an e-mail
message with certain headers containing non-ASCII characters that are
not properly handled when the user replies to the message.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2005-0667|
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 51095 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.