Vulnerability Description
Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Barracuda Networks | Barracuda Spam Firewall | 3.1.16 |
References
- http://marc.info/?l=bugtraq&m=112560044813390&w=2
- http://secunia.com/advisories/16683/PatchVendor Advisory
- http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1PatchVendor Advisory
- http://www.securitytracker.com/alerts/2005/Sep/1014837.htmlPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=112560044813390&w=2
- http://secunia.com/advisories/16683/PatchVendor Advisory
- http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1PatchVendor Advisory
- http://www.securitytracker.com/alerts/2005/Sep/1014837.htmlPatchVendor Advisory
FAQ
What is CVE-2005-2849?
CVE-2005-2849 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2...
How severe is CVE-2005-2849?
CVE-2005-2849 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2849?
Check the references section above for vendor advisories and patch information. Affected products include: Barracuda Networks Barracuda Spam Firewall.