CVE-2018-25223

NameCVE-2018-25223
DescriptionCrashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
crashmail (PTS)bullseye1.7-2undetermined
bookworm, trixie1.7-4undetermined
forky, sid1.7-5undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
crashmailsource(unstable)undetermined

Notes

https://www.exploit-db.com/exploits/44331

Search for package or bug name: Reporting problems