Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Procmail
(Procmail)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-09-08 | CVE-2014-3618 | Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes." | Ubuntu_linux, Procmail | N/A | ||
1999-04-05 | CVE-1999-0475 | A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail. | Procmail | N/A | ||
1999-04-05 | CVE-1999-0439 | Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. | Openlinux, Procmail | N/A | ||
2017-11-16 | CVE-2017-16844 | Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. | Procmail | 9.8 | ||
2001-10-18 | CVE-2001-0905 | Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. | Procmail | N/A |