Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-05-11 CVE-2005-1513 Integer Overflow or Wraparound vulnerability in multiple products
Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.
network
low complexity
qmail-project canonical debian CWE-190
critical
9.8
2005-05-02 CVE-2005-1111 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
local
high complexity
gnu debian canonical CWE-367
4.7
2005-05-02 CVE-2005-1036 Missing Initialization of Resource vulnerability in Freebsd
FreeBSD 5.x to 5.4 on AMD64 does not properly initialize the IO permission bitmap used to allow user access to certain hardware, which allows local users to bypass intended access restrictions to cause a denial of service, obtain sensitive information, and possibly gain privileges.
local
low complexity
freebsd CWE-909
7.8
2005-05-02 CVE-2005-0891 Double Free vulnerability in Gnome GTK
Double free vulnerability in gtk 2 (gtk2) before 2.2.4 allows remote attackers to cause a denial of service (crash) via a crafted BMP image.
network
low complexity
gnome CWE-415
7.5
2005-05-02 CVE-2005-0877 Origin Validation Error vulnerability in Thekelleys Dnsmasq
Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq.
network
low complexity
thekelleys CWE-346
7.5
2005-05-02 CVE-2005-0824 Link Following vulnerability in Mathopd
The internal_dump function in Mathopd before 1.5p5, and 1.6x before 1.6b6 BETA, when Mathopd is running with the -n option, allows local users to overwrite arbitrary files via a symlink attack on dump files that are triggered by a SIGWINCH signal.
local
low complexity
mathopd CWE-59
5.5
2005-05-02 CVE-2005-0490 Incorrect Calculation of Buffer Size vulnerability in Haxx Curl and Libcurl
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
network
low complexity
haxx CWE-131
8.8
2005-05-02 CVE-2005-0269 Improper Handling of Case Sensitivity vulnerability in SIR Gnuboard 3.40
The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters.
network
low complexity
sir CWE-178
critical
9.8
2005-05-02 CVE-2005-0199 Integer Underflow (Wrap or Wraparound) vulnerability in Barton Ngircd
Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow.
network
low complexity
barton CWE-191
critical
9.8
2005-04-15 CVE-2005-1141 Integer Overflow or Wraparound vulnerability in Optical Character Recognition Project Optical Character Recognition 0.40
Integer overflow in the readpgm function in pnm.c for GOCR 0.40, when using the netpbm library, allows remote attackers to execute arbitrary code via a PNM file with large width and height values, which leads to a heap-based buffer overflow.
network
low complexity
optical-character-recognition-project CWE-190
critical
9.8