Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply address, which is not properly handled when printing the header.
References
Link | Resource |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=83541 | Patch Vendor Advisory |
http://secunia.com/advisories/14487 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml | Patch Vendor Advisory |
http://bugs.gentoo.org/show_bug.cgi?id=83541 | Patch Vendor Advisory |
http://secunia.com/advisories/14487 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=83541 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/14487 - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml - Patch, Vendor Advisory |
Information
Published : 2005-03-06 05:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0687
Mitre link : CVE-2005-0687
CVE.ORG link : CVE-2005-0687
JSON object : View
Products Affected
hashcash
- hashcash
CWE