CVE-2005-1515
Publication date 24 May 2020
Last updated 24 July 2024
Ubuntu priority
Integer signedness error in the qmail_put and substdio_put functions in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of SMTP RCPT TO commands.
From the Ubuntu Security Team
It was discovered that netqmail did not properly handle certain input. Both remote and local attackers could use this vulnerability to cause netqmail to crash or execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
netqmail | ||
20.04 LTS focal |
Fixed 1.06-6.2~deb10u1build0.20.04.1
|
|
18.04 LTS bionic |
Fixed 1.06-6.2~deb10u1build0.18.04.1
|
|
16.04 LTS xenial |
Fixed 1.06-6.2~deb10u1build0.16.04.1
|
|
14.04 LTS trusty |
Fixed 1.06-6.2~deb10u1build0.14.04.1+esm1
|
|
qmail | ||
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Related Ubuntu Security Notices (USN)
- USN-4556-1
- netqmail vulnerabilities
- 29 September 2020
- USN-4621-1
- netqmail vulnerabilities
- 5 November 2020