{"id":"CVE-2005-2878","details":"Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.","modified":"2026-01-27T04:06:11.513246Z","published":"2005-09-13T23:03:00Z","withdrawn":"2026-01-27T04:06:11.513246Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/16783"},{"type":"ADVISORY","url":"http://secunia.com/advisories/17020"},{"type":"ADVISORY","url":"http://www.debian.org/security/2005/dsa-841"},{"type":"FIX","url":"http://www.idefense.com/application/poi/display?id=303&type=vulnerabilities&flashstatus=true"},{"type":"FIX","url":"http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=112785181316043&w=2"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-200509-10.xml"},{"type":"WEB","url":"http://www.rosiello.org/archivio/imap4d_FreeBSD_exploit.c"},{"type":"WEB","url":"http://www.securityfocus.com/bid/14794"}],"schema_version":"1.7.3"}