Unrated severityNVD Advisory· Published Dec 21, 2005· Updated Apr 16, 2026
CVE-2005-4444
CVE-2005-4444
Description
Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
Affected products
4cpe:2.3:a:david_harris:pegasus_mail:4.21c:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:david_harris:pegasus_mail:4.21c:*:*:*:*:*:*:*
- cpe:2.3:a:david_harris:pegasus_mail:4.30pb1:*:*:*:*:*:*:*
- cpe:2.3:a:david_harris:pegasus_mail:4.21a:*:*:*:*:*:*:*
- cpe:2.3:a:david_harris:pegasus_mail:4.21b:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/17992nvdPatchVendor Advisory
- www.pmail.com/newsflash.htmnvdPatchVendor Advisory
- secunia.com/secunia_research/2005-61/advisory/nvdVendor Advisory
- www.vupen.com/english/advisories/2005/3004nvdVendor Advisory
- securitytracker.com/idnvd
- www.osvdb.org/21842nvd
- www.securityfocus.com/archive/1/419908/100/0/threadednvd
- www.securityfocus.com/bid/15973nvd
News mentions
0No linked articles in our index yet.