Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer.
Gentoo Linux Security Advisory 201203-1 - A buffer overflow in spamdyke might allow remote attackers to execute arbitrary code. Versions less than 4.3.0 are affected.