CVE-2005-0132
CVSSN/A
发布时间 :2005-01-20 00:00:00
修订时间 :2005-01-20 00:00:00
MOS    

[原文]** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


[CNNVD]CNNVD数据暂缺。


[机译]**储备**候选人由一个组织或个人将使用它宣布了新的安全问题时,已预留。

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0132
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0132
(官方数据源) NVD

- 其它链接及资源

- 漏洞信息

13353
newsfetch NNTP Response Handling Overflow DoS
Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-01-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Newsfetch SScanf Remote Buffer Overflow Vulnerability
Boundary Condition Error 12414
Yes No
2005-02-01 12:00:00 2009-07-12 10:06:00
Discovery is credited to Niels Heinen.

- 受影响的程序版本

Newsfetch Newsfetch 1.21
Newsfetch Newsfetch 1.4

- 漏洞讨论

Newsfetch makes several insecure sscanf calls that could potentially result in a buffer overflow. This is a result of insufficient bounds checking when sscanf stores data in an internal buffer.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站