Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://sylpheed.good-day.net/changelog.html.en
http://www.vuxml.org/freebsd/b1e8c810-01d0-11da-bc08-0001020eed82.html
Insight
The following packages are affected:
sylpheed
sylpheed-gtk2
sylpheed-claws
CVE-2005-0926
Buffer overflow in Sylpheed before 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attachments with MIME-encoded file names.
Severity
Classification
-
CVE CVE-2005-0926 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities