Vulnerability Description
FlatFrag 0.3 and earlier allows remote attackers to cause a denial of service (crash) by sending an NT_CONN_OK command from a client that is not connected, which triggers a null dereference.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Johannes F. Kuhlmann | Flatfrag | 0.3 |
References
- http://aluigi.altervista.org/adv/flatfragz-adv.txtExploit
- http://marc.info/?l=full-disclosure&m=113096078606274&w=2
- http://www.osvdb.org/20770
- http://www.securityfocus.com/archive/1/415636/30/0/threaded
- http://www.securityfocus.com/bid/15287Exploit
- http://www.vupen.com/english/advisories/2005/2285
- http://aluigi.altervista.org/adv/flatfragz-adv.txtExploit
- http://marc.info/?l=full-disclosure&m=113096078606274&w=2
- http://www.osvdb.org/20770
- http://www.securityfocus.com/archive/1/415636/30/0/threaded
- http://www.securityfocus.com/bid/15287Exploit
- http://www.vupen.com/english/advisories/2005/2285
FAQ
What is CVE-2005-3492?
CVE-2005-3492 is a vulnerability with a CVSS score of 5.0 (MEDIUM). FlatFrag 0.3 and earlier allows remote attackers to cause a denial of service (crash) by sending an NT_CONN_OK command from a client that is not connected, which triggers a null dereference.
How severe is CVE-2005-3492?
CVE-2005-3492 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3492?
Check the references section above for vendor advisories and patch information. Affected products include: Johannes F. Kuhlmann Flatfrag.