Vulnerability Description
Multiple buffer overflows in Xzabite DYNDNSUpdate 0.6.15 and earlier, including the ipcheck function in dyndnsupdate.c, allow remote attackers who spoof a dyndns.org server to execute arbitrary code via unknown vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xzabite | Dyndnsupdate | 0.6.15 |
References
- http://bugs.gentoo.org/show_bug.cgi?id=84659Vendor Advisory
- http://secunia.com/advisories/14663Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200503-27.xmlVendor Advisory
- http://bugs.gentoo.org/show_bug.cgi?id=84659Vendor Advisory
- http://secunia.com/advisories/14663Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200503-27.xmlVendor Advisory
FAQ
What is CVE-2005-0830?
CVE-2005-0830 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in Xzabite DYNDNSUpdate 0.6.15 and earlier, including the ipcheck function in dyndnsupdate.c, allow remote attackers who spoof a dyndns.org server to execute arbitrary code v...
How severe is CVE-2005-0830?
CVE-2005-0830 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0830?
Check the references section above for vendor advisories and patch information. Affected products include: Xzabite Dyndnsupdate.