Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-3183

Опубликовано: 07 окт. 2005
Источник: redhat
EPSS Низкий

Описание

The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.

Отчет

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/ The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which are in maintenance mode.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=170518Multiple bugs in libwww - one exploitable - in Library/src/HTBound.c

EPSS

Процентиль: 85%
0.02514
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.

nvd
почти 20 лет назад

The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.

debian
почти 20 лет назад

The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-lib ...

github
больше 3 лет назад

The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.

EPSS

Процентиль: 85%
0.02514
Низкий