7.5
CVSSv2

CVE-2006-3251

Published: 27/06/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the array_push function in hashcash.c for Hashcash prior to 1.21 might allow malicious users to execute arbitrary code via crafted entries.

Vulnerable Product Search on Vulmon Subscribe to Product

hashcash hashcash 1.04

hashcash hashcash 1.05

hashcash hashcash 1.13

hashcash hashcash 1.14

hashcash hashcash 1.02

hashcash hashcash 1.03

hashcash hashcash 1.11

hashcash hashcash 1.12

hashcash hashcash 1.19

hashcash hashcash

hashcash hashcash 1.06

hashcash hashcash 1.07

hashcash hashcash 1.08

hashcash hashcash 1.15

hashcash hashcash 1.16

hashcash hashcash 1.00

hashcash hashcash 1.01

hashcash hashcash 1.09

hashcash hashcash 1.10

hashcash hashcash 1.17

hashcash hashcash 1.18

Vendor Advisories

Debian Bug report logs - #376444 hashcash: CVE-2006-3251: buffer overflow Package: hashcash; Maintainer for hashcash is Debian QA Group <packages@qadebianorg>; Source for hashcash is src:hashcash (PTS, buildd, popcon) Reported by: Alec Berryman <alec@thenednet> Date: Mon, 3 Jul 2006 01:33:10 UTC Severity: seriou ...
Andreas Seltenreich discovered a buffer overflow in hashcash, a postage payment scheme for email that is based on hash calculations, which could allow attackers to execute arbitrary code via specially crafted entries For the stable distribution (sarge) this problem has been fixed in version 117-1sarge1 For the unstable distribution (sid) this pr ...