CVE-2005-1514
Publication date 24 May 2020
Last updated 24 July 2024
Ubuntu priority
commands.c in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SMTP command without a space character, which causes an array to be referenced with a negative index.
From the Ubuntu Security Team
It was discovered that netqmail did not properly handle certain input. Both remote and local attackers could use this vulnerability to cause netqmail to crash or execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
netqmail | ||
20.04 LTS focal |
Fixed 1.06-6.2~deb10u1build0.20.04.1
|
|
18.04 LTS bionic |
Fixed 1.06-6.2~deb10u1build0.18.04.1
|
|
16.04 LTS xenial |
Fixed 1.06-6.2~deb10u1build0.16.04.1
|
|
14.04 LTS trusty |
Fixed 1.06-6.2~deb10u1build0.14.04.1+esm1
|
|
qmail | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Related Ubuntu Security Notices (USN)
- USN-4556-1
- netqmail vulnerabilities
- 29 September 2020
- USN-4621-1
- netqmail vulnerabilities
- 5 November 2020