CVE编号
CVE-2005-1513利用情况
暂无补丁情况
没有补丁披露时间
2005-05-11漏洞描述
在具有大量虚拟内存的64位平台上运行时,qmail的stralloc_readyplus函数中的整数溢出使远程攻击者可以拒绝服务,并可能通过大型SMTP请求执行任意代码。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0101.html | |
http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Re... | |
http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-... | |
http://seclists.org/fulldisclosure/2020/Jun/27 | |
http://seclists.org/fulldisclosure/2020/May/42 | |
http://securitytracker.com/id?1013911 | |
http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html | |
http://www.openwall.com/lists/oss-security/2020/05/19/8 | |
http://www.openwall.com/lists/oss-security/2020/05/20/2 | |
http://www.openwall.com/lists/oss-security/2020/05/20/5 | |
http://www.openwall.com/lists/oss-security/2020/06/16/2 | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | |
https://security.gentoo.org/glsa/202007-01 | |
https://usn.ubuntu.com/4556-1/ | |
https://www.debian.org/security/2020/dsa-4692 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | dan_bernstein | qmail | * | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | netqmail | * |
Up to (excluding) 1.06-6.2~deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | netqmail | * |
Up to (excluding) 1.06-6.2~deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | netqmail | * |
Up to (excluding) 1.06-6.2~deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | netqmail | * |
Up to (excluding) 1.06-6.2~deb10u1build0.16.04.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | netqmail | * |
Up to (excluding) 1.06-6.2~deb10u1build0.18.04.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | netqmail | * |
Up to (excluding) 1.06-6.2~deb10u1build0.20.04.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 N/A
- 补丁情况 没有补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...