CVE-2005-2849

Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.16:*:*:*:*:*:*:*
cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.17:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112560044813390&w=2 - () http://marc.info/?l=bugtraq&m=112560044813390&w=2 -
References () http://secunia.com/advisories/16683/ - Patch, Vendor Advisory () http://secunia.com/advisories/16683/ - Patch, Vendor Advisory
References () http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 - Patch, Vendor Advisory () http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 - Patch, Vendor Advisory
References () http://www.securitytracker.com/alerts/2005/Sep/1014837.html - Patch, Vendor Advisory () http://www.securitytracker.com/alerts/2005/Sep/1014837.html - Patch, Vendor Advisory

Information

Published : 2005-09-08 10:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2849

Mitre link : CVE-2005-2849

CVE.ORG link : CVE-2005-2849


JSON object : View

Products Affected

barracuda_networks

  • barracuda_spam_firewall