5 results (0.003 seconds)

CVSS: 2.6EPSS: 3%CPEs: 2EXPL: 2

Kmail 1.9.1 on KDE 3.5.2, with "Prefer HTML to Plain Text" enabled, allows remote attackers to cause a denial of service (crash) via an HTML e-mail with certain table and frameset tags that trigger a segmentation fault, possibly involving invalid free or delete operations. Kmail 1.9.1 en el KDE 3.5.2, con el "Preferencia de HTML frente al Texto Plano" habilitado, permite a atacantes remotos provocar una denegación de servicio (caída) mediante un e-mail HTML con ciertas tables y etiquetas frameset lo que disparan un fallo de segmentación, posiblemente involucrando operaciones no válidas de borrado o libres. • https://www.exploit-db.com/exploits/28816 http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0293.html http://secunia.com/advisories/24889 http://securityreason.com/securityalert/2347 http://www.novell.com/linux/security/advisories/2007_6_sr.html http://www.securityfocus.com/archive/1/448766/100/0/threaded http://www.securityfocus.com/archive/1/448768/100/0/threaded http://www.securityfocus.com/bid/20539 https://exchange.xforce.ibmcloud.com/vulnerabilities/29557 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 3%CPEs: 26EXPL: 0

KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. KMail 1.9.5 y anteriores no utiliza adecuadamente el argumento --status-fd al invocar a GnuPG, lo cual provoca que KMail no distinga visualmente entre trozos firmados y no firmados de mensajes OpenPGP con múltiples componentes, lo cual permite a atacantes remotos falsificar el contenido de un mensaje si ser detectado. • http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html http://secunia.com/advisories/24413 http://securityreason.com/securityalert/2353 http://www.coresecurity.com/?action=item&id=1687 http://www.securityfocus.com/archive/1/461958/100/0/threaded http://www.securityfocus.com/archive/1/461958/30/7710/threaded http://www.securityfocus.com/bid/22759 http://www.securitytracker.com/id?1017727 http://www.vupen.com/english/advisories/2007/0835 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Kmail 1.2 on KDE 2.1.1 allows remote attackers to cause a denial of service (crash) via an email message whose body is approximately 55 K long. • http://marc.info/?l=bugtraq&m=101475683425671&w=2 http://www.iss.net/security_center/static/8283.php http://www.securityfocus.com/bid/4177 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. • https://www.exploit-db.com/exploits/19240 http://www.redhat.com/support/errata/RHSA1999015_01.html http://www.securityfocus.com/bid/300 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in KDE Kmail allows a remote attacker to cause a denial of service via an attachment with a long file name. • http://securityfocus.com/templates/archive.pike?list=82&date=2000-06-22&msg=00060200422401.01667%40lez http://www.securityfocus.com/bid/1380 https://exchange.xforce.ibmcloud.com/vulnerabilities/4993 •