7.5
CVSSv2

CVE-2005-1349

Published: 02/05/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Convert-UUlib (Convert::UUlib) prior to 1.051 allows remote malicious users to execute arbitrary code via a malformed parameter to a read operation.

Vulnerable Product Search on Vulmon Subscribe to Product

perl convert uulib

Vendor Advisories

Mark Martinec and Robert Lewis discovered a buffer overflow in Convert::UUlib, a Perl interface to the uulib library, which may result in the execution of arbitrary code For the stable distribution (woody) this problem has been fixed in version 0201-2woody1 For the testing (sarge) and unstable (sid) distributions this problem has been fixed in v ...

Exploits

source: wwwsecurityfocuscom/bid/13401/info Convert-UUlib Perl module is prone to a remotely exploitable buffer-overflow vulnerability A remote attacker may leverage this condition to overwrite sensitive program control variables and thus gain control of the process's execution flow This BID will be updated as soon as further informati ...