Vulnerabilities > CVE-2005-1391 - Remote Buffer Overflow vulnerability in Apsis Pound 1.8.2

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
apsis
nessus

Summary

Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.

Vulnerable Configurations

Part Description Count
Application
Apsis
1

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-934.NASL
    descriptionTwo vulnerabilities have been discovered in Pound, a reverse proxy and load balancer for HTTP. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2005-1391 : Overly long HTTP Host: headers may trigger a buffer overflow in the add_port() function, which may lead to the execution of arbitrary code. - CVE-2005-3751 : HTTP requests with conflicting Content-Length and Transfer-Encoding headers could lead to HTTP Request Smuggling Attack, which can be exploited to bypass packet filters or poison web caches.
    last seen2020-06-01
    modified2020-06-02
    plugin id22800
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22800
    titleDebian DSA-934-1 : pound - several vulnerabilities
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200504-29.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200504-29 (Pound: Buffer overflow vulnerability) Steven Van Acker has discovered a buffer overflow vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id18168
    published2005-05-02
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18168
    titleGLSA-200504-29 : Pound: Buffer overflow vulnerability