Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0263 Local Buffer Overflow vulnerability in IBM AIX 5.1/5.2/5.3
Buffer overflow in netpmon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -O argument.
local
low complexity
ibm
7.2
2005-05-02 CVE-2005-0262 Local Buffer Overflow vulnerability in IBM AIX 5.1/5.2/5.3
Buffer overflow in ipl_varyon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -d argument.
local
low complexity
ibm
7.2
2005-05-02 CVE-2005-0260 Unspecified vulnerability in Broadcom Brightstor Arcserve Backup 11.1
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
network
low complexity
broadcom
critical
10.0
2005-05-02 CVE-2005-0256 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Washington University Wu-Ftpd 2.6.1/2.6.2
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
network
low complexity
washington-university CWE-119
5.0
2005-05-02 CVE-2005-0255 Remote vulnerability in Mozilla Firefox, Mozilla and Thunderbird
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
network
low complexity
mozilla
5.0
2005-05-02 CVE-2005-0250 Local Format String vulnerability in IBM AIX 5.1/5.2/5.3
Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument.
local
low complexity
ibm
7.2
2005-05-02 CVE-2005-0248 Unspecified vulnerability in SUN Solaris and Sunos
The Solaris Management Console (SMC) GUI for Solaris 8 and 9, when creating user accounts that are configured for password aging, creates the accounts with a blank password, which allows remote or local attackers to break into those accounts.
network
low complexity
sun
7.5
2005-05-02 CVE-2005-0247 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Postgresql
Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
network
low complexity
postgresql CWE-119
6.5
2005-05-02 CVE-2005-0244 Permissions, Privileges, and Access Controls vulnerability in Postgresql
PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
network
low complexity
postgresql CWE-264
6.5
2005-05-02 CVE-2005-0241 Remote vulnerability in Squid Proxy Oversize HTTP Headers
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
network
low complexity
squid
5.0