HP DTMail Attachment Argument Buffer Overflow Vulnerability

A buffer-overflow vulnerability occurs in dtmail when processing an overly long argument to the application's '-a' option. The problem occurs because the application fails to perform sufficient boundary checks when copying a filename argument into an internal memory buffer.

An attacker may exploit this buffer overflow to execute arbitrary code. In the case where an application has the 'setgid' bit turned on, a compromise in the context of a member of the group 'mail' is possible.

This vulnerability resides in dtmail version 5.1b; other versions might also be affected.


 

Privacy Statement
Copyright 2010, SecurityFocus