Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
- http://bugs.gentoo.org/show_bug.cgi?id=190104
- http://www.novell.com/linux/security/advisories/2007_20_sr.html
No PoCs found on GitHub currently.