5
CVSSv2

CVE-2005-1513

Published: 11/05/2005 Updated: 08/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a large SMTP request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qmail project qmail -

canonical ubuntu linux 20.04

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Georgi Guninski and the Qualys Research Labs discovered multiple vulnerabilities in qmail (shipped in Debian as netqmail with additional patches) which could result in the execution of arbitrary code, bypass of mail address verification and a local information leak whether a file exists or not For the oldstable distribution (stretch), these proble ...

Exploits

In 2005, three vulnerabilities were discovered in qmail but were never fixed because they were believed to be unexploitable in a default installation Qualys recently re-discovered these vulnerabilities and were able to exploit one of them remotely in a default installation ...
RenderDoc versions 126 and below suffer from integer underflow, integer overflow, and symlink vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Sec ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Security Ad ...

Github Repositories

qmail is a secure, reliable, efficient, simple message transfer agent.

qmail qmail is a secure, reliable, efficient, simple message transfer agent It is designed for typical Internet-connected UNIX hosts It was developed by D J Bernstein My patched qmail More info at notessagredoeu/en/qmail-notes-185/patching-qmail-82html This distribution of qmail puts together netqmail-106 with the following patches (more info in the README file