Summary
The remote host is missing an update to sylpheed-claws announced via advisory DSA 908-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20908-1
Insight
Colin Leroy discovered several buffer overflows in a number of importer routines in sylpheed-claws, an extended version of the Sylpheed mail client, that could lead to the execution of arbitrary code.
The following matrix explains which versions fix this vulnerability
old stable (woody) stable (sarge) unstable (sid) sylpheed 0.7.4-4woody1 1.0.4-1sarge1 2.0.4-1 sylpheed-gtk1 n/a n/a 1.0.6-1 sylpheed-claws 0.7.4claws-3woody1 1.0.4-1sarge1 1.0.5-2 sylpheed-claws-gtk2 n/a n/a 1.9.100-1
We recommend that you upgrade your sylpheed-claws package.
Severity
Classification
-
CVE CVE-2005-3354 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities