Zebedee 2.4.1, when "allowed redirection port" is not set, allows remote attackers to cause a denial of service (application crash) via a zero in the port number of the protocol option header, which triggers an assert error in the makeConnection function in zebedee.c.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=112629543605488&w=2 | |
http://secunia.com/advisories/16788/ | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200509-14.xml | |
http://www.securityfocus.com/bid/14796 | Exploit Patch |
http://marc.info/?l=bugtraq&m=112629543605488&w=2 | |
http://secunia.com/advisories/16788/ | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200509-14.xml | |
http://www.securityfocus.com/bid/14796 | Exploit Patch |
Configurations
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=112629543605488&w=2 - | |
References | () http://secunia.com/advisories/16788/ - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200509-14.xml - | |
References | () http://www.securityfocus.com/bid/14796 - Exploit, Patch |
Information
Published : 2005-09-14 20:03
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2904
Mitre link : CVE-2005-2904
CVE.ORG link : CVE-2005-2904
JSON object : View
Products Affected
zebedee
- zebedee
CWE