5
CVSSv2

CVE-2005-1127

Published: 02/05/2005 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Format string vulnerability in the log function in Net::Server 0.87 and previous versions, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and previous versions, and possibly other products, allows remote malicious users to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.

Vulnerable Product Search on Vulmon Subscribe to Product

postgrey postgrey 1.18

postgrey postgrey

postgrey postgrey 1.17

Vendor Advisories

Debian Bug report logs - #378640 libnet-server-perl: [CVE-2005-1127] format string vulnerability in log() function Package: libnet-server-perl; Maintainer for libnet-server-perl is Debian Perl Group <pkg-perl-maintainers@listsaliothdebianorg>; Source for libnet-server-perl is src:libnet-server-perl (PTS, buildd, popcon) R ...
Peter Bieringer discovered that the "log" function in the Net::Server Perl module, an extensible, general perl server engine, is not safe against format string exploits The old stable distribution (woody) does not contain this package For the stable distribution (sarge) this problem has been fixed in version 087-3sarge1 For the unstable distrib ...