CVE-2005-3780

Multiple buffer overflows in IPUpdate 1.1 might allow attackers to execute arbitrary code via (1) memmcat in the memm module or (2) certain TSIG format records.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipupdate:ipupdate:1.0:*:*:*:*:*:*:*
cpe:2.3:a:ipupdate:ipupdate:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ipupdate:ipupdate:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ipupdate:ipupdate:1.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://secunia.com/advisories/17681 - Vendor Advisory () http://secunia.com/advisories/17681 - Vendor Advisory
References () http://sourceforge.net/project/shownotes.php?release_id=372666 - () http://sourceforge.net/project/shownotes.php?release_id=372666 -
References () http://www.osvdb.org/21036 - () http://www.osvdb.org/21036 -
References () http://www.osvdb.org/21037 - () http://www.osvdb.org/21037 -
References () http://www.securityfocus.com/bid/15534 - Vendor Advisory () http://www.securityfocus.com/bid/15534 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/2523 - () http://www.vupen.com/english/advisories/2005/2523 -

Information

Published : 2005-11-23 01:03

Updated : 2025-04-03 01:03


NVD link : CVE-2005-3780

Mitre link : CVE-2005-3780

CVE.ORG link : CVE-2005-3780


JSON object : View

Products Affected

ipupdate

  • ipupdate