5
CVSSv2

CVE-2005-1514

Published: 11/05/2005 Updated: 05/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

commands.c in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long SMTP command without a space character, which causes an array to be referenced with a negative index.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dan bernstein qmail

Vendor Advisories

Georgi Guninski and the Qualys Research Labs discovered multiple vulnerabilities in qmail (shipped in Debian as netqmail with additional patches) which could result in the execution of arbitrary code, bypass of mail address verification and a local information leak whether a file exists or not For the oldstable distribution (stretch), these proble ...

Exploits

In 2005, three vulnerabilities were discovered in qmail but were never fixed because they were believed to be unexploitable in a default installation Qualys recently re-discovered these vulnerabilities and were able to exploit one of them remotely in a default installation ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Sec ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Security Ad ...