Vulnerabilities > CVE-2005-1099 - Unspecified vulnerability in Salim Gasmi GLD
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability. CVE-2005-1099. Remote exploit for linux platform id EDB-ID:25392 last seen 2016-02-03 modified 2005-04-12 published 2005-04-12 reporter Xpl017Elz source https://www.exploit-db.com/download/25392/ title Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability description GLD (Greylisting Daemon) Postfix Buffer Overflow. CVE-2005-1099. Remote exploit for linux platform id EDB-ID:16841 last seen 2016-02-02 modified 2010-07-03 published 2010-07-03 reporter metasploit source https://www.exploit-db.com/download/16841/ title GLD Greylisting Daemon Postfix Buffer Overflow description Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow. CVE-2005-1099. Remote exploit for linux platform id EDB-ID:10023 last seen 2016-02-01 modified 2005-04-12 published 2005-04-12 reporter patrick source https://www.exploit-db.com/download/10023/ title Salim Gasmi GLD 1.0 - 1.4 - Postfix Greylisting Buffer Overflow
Metasploit
description | This module exploits a stack buffer overflow in the Salim Gasmi GLD <= 1.4 greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten. |
id | MSF:EXPLOIT/LINUX/MISC/GLD_POSTFIX |
last seen | 2020-06-01 |
modified | 2017-11-08 |
published | 2008-06-07 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/misc/gld_postfix.rb |
title | GLD (Greylisting Daemon) Postfix Buffer Overflow |
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_6C2D4F29AF3E11D9837D000E0C2E438A.NASL description Gld has been found vulnerable to multiple buffer overflows as well as multiple format string vulnerabilities. An attacker could exploit this vulnerability to execute arbitrary code with the permissions of the user running Gld, the default user being root. The FreeBSD port defaults to running gld as the root user. The risk of exploitation can be minimized by making gld listen on the loopback address only, or configure it to only accept connections from trusted smtp servers. last seen 2020-06-01 modified 2020-06-02 plugin id 18974 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18974 title FreeBSD : gld -- format string and buffer overflow vulnerabilities (6c2d4f29-af3e-11d9-837d-000e0c2e438a) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200504-10.NASL description The remote host is affected by the vulnerability described in GLSA-200504-10 (Gld: Remote execution of arbitrary code) dong-hun discovered several buffer overflows in server.c, as well as several format string vulnerabilities in cnf.c. Impact : An attacker could exploit this vulnerability to execute arbitrary code with the permissions of the user running Gld, the default user being root. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 18043 published 2005-04-14 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18043 title GLSA-200504-10 : Gld: Remote execution of arbitrary code
Packetstorm
data source | https://packetstormsecurity.com/files/download/82242/gld_postfix.rb.txt |
id | PACKETSTORM:82242 |
last seen | 2016-12-05 |
published | 2009-10-27 |
reporter | patrick |
source | https://packetstormsecurity.com/files/82242/GLD-Greylisting-Daemon-Postfix-Buffer-Overflow.html |
title | GLD (Greylisting Daemon) Postfix Buffer Overflow |
References
- http://marc.info/?l=bugtraq&m=111339935903880&w=2
- http://marc.info/?l=bugtraq&m=111342432325670&w=2
- http://secunia.com/advisories/14941
- http://security.gentoo.org/glsa/glsa-200504-10.xml
- http://securitytracker.com/alerts/2005/Apr/1013678.html
- http://www.gasmi.net/down/gld-history
- http://www.osvdb.org/15492
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20066