5
CVSSv2

CVE-2005-1515

Published: 11/05/2005 Updated: 05/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer signedness error in the qmail_put and substdio_put functions in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a large number of SMTP RCPT TO commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dan bernstein qmail

Vendor Advisories

Georgi Guninski and the Qualys Research Labs discovered multiple vulnerabilities in qmail (shipped in Debian as netqmail with additional patches) which could result in the execution of arbitrary code, bypass of mail address verification and a local information leak whether a file exists or not For the oldstable distribution (stretch), these proble ...

Exploits

In 2005, three vulnerabilities were discovered in qmail but were never fixed because they were believed to be unexploitable in a default installation Qualys recently re-discovered these vulnerabilities and were able to exploit one of them remotely in a default installation ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Sec ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote Code Execution in qmail (CVE-2005-1513) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Security Ad ...