DEBIAN-CVE-2005-0100

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2005-0100
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2005-0100.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2005-0100
Upstream
Published
2005-02-07T05:00:00Z
Modified
2025-09-19T06:16:57Z
Summary
[none]
Details

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

References

Affected packages

Debian:11 / xemacs21

Package

Name
xemacs21
Purl
pkg:deb/debian/xemacs21?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.4.16-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xemacs21

Package

Name
xemacs21
Purl
pkg:deb/debian/xemacs21?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.4.16-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}