5
CVSSv2

CVE-2004-1705

Published: 30/07/2004 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in Citadel/UX 6.23 and previous versions allows remote malicious users to cause a denial of service via a long username.

Vulnerable Product Search on Vulmon Subscribe to Product

citadel ux 6.08

citadel ux 6.23

citadel ux 5.90

citadel ux 5.91

citadel ux 6.07

Exploits

/* citadel_dosc * * Citadel/UX Remote DoS exploit (Proof of Concept) * * Tested in Slackware 900 / 910 / 1000 * * by CoKi <coki@nosystemcomar> * No System Group - wwwnosystemcomar */ #include <stdioh> #include <stdlibh> #include <unistdh> #include <errnoh> #include <stringh> #include < ...
/* Citadel/UX remote exploit By nebunu: pppppppal at yahoo dot com This is the version which contains targets,abuse it kiddies Bruteforce: You only have 4096/4=1024 tries The magic offset lies about 2048 + or - 4,8,16256 So practically speaking you have maximum 256 tries Greetings: DrBIOS,Bagabontu,rebel,R4X and all the friends i have ...
/* Citadel/UX remote exploit By nebunu: pppppppal at yahoo dot com homero lamerz erased my nebunu@homero address for hosting exploits there Citadel/UX is a very well known client/server messaging for BBS which runs on port 504 by default It has been discovered that is suffers for a buffer overflow when USER is sent The bug was discovered by ...