Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5723

Опубликовано: 30 окт. 2007
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

Heap-based buffer overflow in the samp_send function in nuauth/sasl.c in NuFW before 2.2.7 allows remote attackers to cause a denial of service via unspecified input on which base64 encoding is performed. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.2.10-2
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

not-affected

2.2.10-2
intrepid

not-affected

2.2.10-2
jaunty

not-affected

2.2.10-2
karmic

not-affected

2.2.10-2
upstream

released

2.2.7

Показывать по

Ссылки на источники

EPSS

Процентиль: 73%
0.00796
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 18 лет назад

Heap-based buffer overflow in the samp_send function in nuauth/sasl.c in NuFW before 2.2.7 allows remote attackers to cause a denial of service via unspecified input on which base64 encoding is performed. NOTE: some of these details are obtained from third party information.

debian
почти 18 лет назад

Heap-based buffer overflow in the samp_send function in nuauth/sasl.c ...

github
больше 3 лет назад

Heap-based buffer overflow in the samp_send function in nuauth/sasl.c in NuFW before 2.2.7 allows remote attackers to cause a denial of service via unspecified input on which base64 encoding is performed. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 73%
0.00796
Низкий

5 Medium

CVSS2