openbsd-ports/editors/emacs21/patches/patch-lib-src_movemail_c
brad e296bee697 Max Vozeler discovered a format string vulnerability in the "movemail"
utility of Emacs. By sending specially crafted packets, a malicious
POP3 server could cause a buffer overflow, which could have been
exploited to execute arbitrary code with the privileges of the user.
2005-02-09 03:48:43 +00:00

13 lines
407 B
Plaintext

$OpenBSD: patch-lib-src_movemail_c,v 1.1 2005/02/09 03:48:43 brad Exp $
--- lib-src/movemail.c.orig Tue Feb 8 20:30:56 2005
+++ lib-src/movemail.c Tue Feb 8 20:32:28 2005
@@ -787,7 +787,7 @@ popmail (mailbox, outfile, preserve, pas
mbx_delimit_begin (mbf);
if (pop_retr (server, i, mbf) != OK)
{
- error (Errmsg, 0, 0);
+ error ("%s", Errmsg, 0);
close (mbfi);
return (1);
}