7.8
CVSSv2

CVE-2005-4439

Published: 21/12/2005 Updated: 20/07/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Buffer overflow in ELOG elogd 2.6.0-beta4 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a URL with a long (1) cmd or (2) mode parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

elog elogd 2.6.0_beta4

Vendor Advisories

Debian Bug report logs - #349528 various unfixed security bugs Package: elog; Maintainer for elog is Roger Kalt <rogerkalt@gmailcom>; Source for elog is src:elog (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 23 Jan 2006 15:48:16 UTC Severity: grave Tags: fixed, fixed-upstream, sec ...
Several security problems have been found in elog, an electronic logbook to manage notes The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2005-4439 "GroundZero Security" discovered that elog insufficiently checks the size of a buffer used for processing URL parameters, which might lead to the exe ...