Family: Red Hat Local Security Checks --> Category: infos
RHSA-2005-303: sylpheed Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the sylpheed packages
Detailed Explanation for this Vulnerability Test
An updated sylpheed package that fixes a buffer overflow issue is now
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Sylpheed is a GTK+ based fast email client.
A buffer overflow bug has been found in the way Sylpheed handles non-ASCII
characters in the header of a message to which a victim replies. A
carefully crafted email message could potentially allow a possible hacker to
execute arbitrary code on a victim's machine if they reply to such a
message. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2005-0667 to this issue.
Users of Sylpheed should upgrade to this updated package, which contains a
backported patch, and is not vulnerable to this issue.
Solution : http://rhn.redhat.com/errata/RHSA-2005-303.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.