Vulnerability Description
Buffer overflow in luxman before 0.41, if used with certain insecure svgalib libraries, allows local users to execute arbitrary code via a long -f command line argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Frank Mcingvale | Luxman | 0.41 |
References
- http://secunia.com/advisories/14582ExploitVendor Advisory
- http://www.debian.org/security/2005/dsa-693ExploitVendor Advisory
- http://www.digitalmunition.com/DMA%5B2005-0310a%5D.txt
- http://www.securityfocus.com/archive/1/393195/2005-03-13/2005-03-19/0
- http://www.securityfocus.com/bid/12797Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19680
- http://secunia.com/advisories/14582ExploitVendor Advisory
- http://www.debian.org/security/2005/dsa-693ExploitVendor Advisory
- http://www.digitalmunition.com/DMA%5B2005-0310a%5D.txt
- http://www.securityfocus.com/archive/1/393195/2005-03-13/2005-03-19/0
- http://www.securityfocus.com/bid/12797Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19680
FAQ
What is CVE-2005-0385?
CVE-2005-0385 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in luxman before 0.41, if used with certain insecure svgalib libraries, allows local users to execute arbitrary code via a long -f command line argument.
How severe is CVE-2005-0385?
CVE-2005-0385 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0385?
Check the references section above for vendor advisories and patch information. Affected products include: Frank Mcingvale Luxman.