It has been reported that an unspecified buffer overflow vulnerability exists in Dr. Web. Users of Dr. Web have reported seeing this message logged to syslog by ProPolice on OpenBSD computers: drwebd: stack overflow in function int scanMail(int, time_t *, int, int, const char *) An unspecified buffer overflow in the scanMail() function may be exploitable. If it is, attempts to exploit it may result in the affected application crashing. This may also be leveraged to execute arbitrary code in the context of the Dr. Web process. As more information is known, this BID will be updated.
It has been reported that an unspecified buffer overflow vulnerability exists in Dr. Web. Users of Dr. Web have reported seeing this message logged to syslog by ProPolice on OpenBSD computers: drwebd: stack overflow in function int scanMail(int, time_t *, int, int, const char *) An unspecified buffer overflow in the scanMail() function may be exploitable. If it is, attempts to exploit it may result in the affected application crashing. This may also be leveraged to execute arbitrary code in the context of the Dr. Web process. As more information is known, this BID will be updated.