Vulnerability Description
Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply address, which is not properly handled when printing the header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashcash | Hashcash | 1.14 |
References
- http://bugs.gentoo.org/show_bug.cgi?id=83541PatchVendor Advisory
- http://secunia.com/advisories/14487PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200503-12.xmlPatchVendor Advisory
- http://bugs.gentoo.org/show_bug.cgi?id=83541PatchVendor Advisory
- http://secunia.com/advisories/14487PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200503-12.xmlPatchVendor Advisory
FAQ
What is CVE-2005-0687?
CVE-2005-0687 is a vulnerability with a CVSS score of 7.5 (HIGH). Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply addre...
How severe is CVE-2005-0687?
CVE-2005-0687 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0687?
Check the references section above for vendor advisories and patch information. Affected products include: Hashcash Hashcash.