Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3863

Опубликовано: 29 нояб. 2005
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
centericqfixed4.21.0-6package
orpheusfixed1.5-5package
motorfixed2:3.4.0-6package

Примечания

  • DTSA is for centericq only

  • This affects Sarge and Woody centericq

  • This affects Sarge and Woody motor

EPSS

Процентиль: 91%
0.0726
Низкий

Связанные уязвимости

ubuntu
около 20 лет назад

Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.

nvd
около 20 лет назад

Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.

github
почти 4 года назад

Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.

EPSS

Процентиль: 91%
0.0726
Низкий