Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111116097313427&w=2 - | |
References | () http://secunia.com/advisories/14630 - Patch | |
References | () http://securitytracker.com/id?1013476 - | |
References | () http://www.oxid.it/ - | |
References | () http://www.securityfocus.com/bid/12840 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19742 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19744 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0807
Mitre link : CVE-2005-0807
CVE.ORG link : CVE-2005-0807
JSON object : View
Products Affected
oxid
- cain_and_abel
CWE