Описание
Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.
Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-1391
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20316
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=307852
- http://secunia.com/advisories/15142
- http://secunia.com/advisories/15202
- http://secunia.com/advisories/15679
- http://secunia.com/advisories/18381
- http://security.gentoo.org/glsa/glsa-200504-29.xml
- http://securitytracker.com/id?1013824
- http://www.apsis.ch/pound/pound_list/archive/2005/2005-04/1114516112000
- http://www.debian.org/security/2005/dsa-934
- http://www.osvdb.org/15963
- http://www.securityfocus.com/bid/13436
- http://www.vupen.com/english/advisories/2005/0437
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.
Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.
Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earl ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS