Max Vozeler discovered several format string vulnerabilities in the movemail utility of XEmacs. If a user connects to a malicious POP server, an attacker can execute arbitrary code as the user running xemacs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0100 to this issue. Info: https://rhn.redhat.com/errata/RHSA-2005-134.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 ------- Bug moved to this database by dkl 2005-03-30 18:31 ------- This bug previously known as bug 2423 at https://bugzilla.fedora.us/ https://bugzilla.fedora.us/show_bug.cgi?id=2423 Originally filed under the Fedora Legacy product and Package request component. Unknown priority P2. Setting to default priority "normal". Unknown platform PC. Setting to default platform "All". Setting qa contact to the default for this product. This bug either had no qa contact or an invalid one.
Fedora Legacy project has ended. These will not be fixed by Fedora Legacy.