Vulnerability Description
Buffer overflow in HP Radia Notify Daemon 3.1.0.0 (formerly by Novadigm), and other versions including 2.x, 3.x, and 4.x, allows remote attackers to execute arbitrary code via a long file extension.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hp | Radia Client | 3.1.0.0 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034387.htmlExploitVendor Advisory
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034394.html
- http://secunia.com/advisories/15567
- http://securitytracker.com/id?1014089
- http://www.grok.org.uk/advisories/radexecd.html
- http://www.vupen.com/english/advisories/2005/0681
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034387.htmlExploitVendor Advisory
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034394.html
- http://secunia.com/advisories/15567
- http://securitytracker.com/id?1014089
- http://www.grok.org.uk/advisories/radexecd.html
- http://www.vupen.com/english/advisories/2005/0681
FAQ
What is CVE-2005-1826?
CVE-2005-1826 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in HP Radia Notify Daemon 3.1.0.0 (formerly by Novadigm), and other versions including 2.x, 3.x, and 4.x, allows remote attackers to execute arbitrary code via a long file extension.
How severe is CVE-2005-1826?
CVE-2005-1826 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1826?
Check the references section above for vendor advisories and patch information. Affected products include: Hp Radia Client.