Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.3.bl.3.dfsg-8+deb7u1build0.14.04.1", "binary_name": "xbuffy" }, { "binary_version": "3.3.bl.3.dfsg-8+deb7u1build0.14.04.1", "binary_name": "xbuffy-dbgsym" } ] }