CVE-2005-1349

Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:perl:convert_uulib:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://secunia.com/advisories/15130 - Patch () http://secunia.com/advisories/15130 - Patch
References () http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml - () http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:022 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:022 -
References () http://www.securityfocus.com/bid/13401 - () http://www.securityfocus.com/bid/13401 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/20275 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/20275 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1349

Mitre link : CVE-2005-1349

CVE.ORG link : CVE-2005-1349


JSON object : View

Products Affected

perl

  • convert_uulib