Vulnerability Description
The web module in Neteyes Nexusway allows remote attackers to execute arbitrary commands via hex-encoded shell metacharacters in the ip parameter for (1) nslookup.cgi or (2) ping.cgi.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Neteyes | Nexusway | 805 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033945.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&m=111585017832066&w=2
- http://secunia.com/advisories/15150ExploitPatchVendor Advisory
- http://www.osvdb.org/16448Vendor Advisory
- http://www.osvdb.org/16449Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20557
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033945.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&m=111585017832066&w=2
- http://secunia.com/advisories/15150ExploitPatchVendor Advisory
- http://www.osvdb.org/16448Vendor Advisory
- http://www.osvdb.org/16449Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20557
FAQ
What is CVE-2005-1559?
CVE-2005-1559 is a vulnerability with a CVSS score of 10.0 (HIGH). The web module in Neteyes Nexusway allows remote attackers to execute arbitrary commands via hex-encoded shell metacharacters in the ip parameter for (1) nslookup.cgi or (2) ping.cgi.
How severe is CVE-2005-1559?
CVE-2005-1559 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1559?
Check the references section above for vendor advisories and patch information. Affected products include: Neteyes Nexusway.