CVE-2005-0687

Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply address, which is not properly handled when printing the header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hashcash:hashcash:1.14:*:*:*:*:*:*:*
cpe:2.3:a:hashcash:hashcash:1.15:*:*:*:*:*:*:*
cpe:2.3:a:hashcash:hashcash:1.16:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=83541 - Patch, Vendor Advisory () http://bugs.gentoo.org/show_bug.cgi?id=83541 - Patch, Vendor Advisory
References () http://secunia.com/advisories/14487 - Patch, Vendor Advisory () http://secunia.com/advisories/14487 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml - Patch, Vendor Advisory

Information

Published : 2005-03-06 05:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0687

Mitre link : CVE-2005-0687

CVE.ORG link : CVE-2005-0687


JSON object : View

Products Affected

hashcash

  • hashcash