Vulnerability Description
Multiple buffer overflows in IPUpdate 1.1 might allow attackers to execute arbitrary code via (1) memmcat in the memm module or (2) certain TSIG format records.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipupdate | Ipupdate | 1.0 |
References
- http://secunia.com/advisories/17681Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=372666
- http://www.osvdb.org/21036
- http://www.osvdb.org/21037
- http://www.securityfocus.com/bid/15534Vendor Advisory
- http://www.vupen.com/english/advisories/2005/2523
- http://secunia.com/advisories/17681Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=372666
- http://www.osvdb.org/21036
- http://www.osvdb.org/21037
- http://www.securityfocus.com/bid/15534Vendor Advisory
- http://www.vupen.com/english/advisories/2005/2523
FAQ
What is CVE-2005-3780?
CVE-2005-3780 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in IPUpdate 1.1 might allow attackers to execute arbitrary code via (1) memmcat in the memm module or (2) certain TSIG format records.
How severe is CVE-2005-3780?
CVE-2005-3780 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3780?
Check the references section above for vendor advisories and patch information. Affected products include: Ipupdate Ipupdate.