Vulnerabilities > CVE-2005-1099 - Unspecified vulnerability in Salim Gasmi GLD

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
salim-gasmi
critical
nessus
exploit available
metasploit

Summary

Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.

Exploit-Db

  • descriptionSalim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability. CVE-2005-1099. Remote exploit for linux platform
    idEDB-ID:25392
    last seen2016-02-03
    modified2005-04-12
    published2005-04-12
    reporterXpl017Elz
    sourcehttps://www.exploit-db.com/download/25392/
    titleSalim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
  • descriptionGLD (Greylisting Daemon) Postfix Buffer Overflow. CVE-2005-1099. Remote exploit for linux platform
    idEDB-ID:16841
    last seen2016-02-02
    modified2010-07-03
    published2010-07-03
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16841/
    titleGLD Greylisting Daemon Postfix Buffer Overflow
  • descriptionSalim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow. CVE-2005-1099. Remote exploit for linux platform
    idEDB-ID:10023
    last seen2016-02-01
    modified2005-04-12
    published2005-04-12
    reporterpatrick
    sourcehttps://www.exploit-db.com/download/10023/
    titleSalim Gasmi GLD 1.0 - 1.4 - Postfix Greylisting Buffer Overflow

Metasploit

descriptionThis module exploits a stack buffer overflow in the Salim Gasmi GLD <= 1.4 greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten.
idMSF:EXPLOIT/LINUX/MISC/GLD_POSTFIX
last seen2020-06-01
modified2017-11-08
published2008-06-07
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/misc/gld_postfix.rb
titleGLD (Greylisting Daemon) Postfix Buffer Overflow

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_6C2D4F29AF3E11D9837D000E0C2E438A.NASL
    descriptionGld has been found vulnerable to multiple buffer overflows as well as multiple format string vulnerabilities. An attacker could exploit this vulnerability to execute arbitrary code with the permissions of the user running Gld, the default user being root. The FreeBSD port defaults to running gld as the root user. The risk of exploitation can be minimized by making gld listen on the loopback address only, or configure it to only accept connections from trusted smtp servers.
    last seen2020-06-01
    modified2020-06-02
    plugin id18974
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/18974
    titleFreeBSD : gld -- format string and buffer overflow vulnerabilities (6c2d4f29-af3e-11d9-837d-000e0c2e438a)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200504-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200504-10 (Gld: Remote execution of arbitrary code) dong-hun discovered several buffer overflows in server.c, as well as several format string vulnerabilities in cnf.c. Impact : An attacker could exploit this vulnerability to execute arbitrary code with the permissions of the user running Gld, the default user being root. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id18043
    published2005-04-14
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/18043
    titleGLSA-200504-10 : Gld: Remote execution of arbitrary code

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82242/gld_postfix.rb.txt
idPACKETSTORM:82242
last seen2016-12-05
published2009-10-27
reporterpatrick
sourcehttps://packetstormsecurity.com/files/82242/GLD-Greylisting-Daemon-Postfix-Buffer-Overflow.html
titleGLD (Greylisting Daemon) Postfix Buffer Overflow