ID CVE-2005-1391
Summary Buffer overflow in the add_port function in APSIS Pound 1.8.2 and earlier allows remote attackers to execute arbitrary code via a long Host HTTP header.
References
Vulnerable Configurations
  • cpe:2.3:a:apsis:pound:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:apsis:pound:1.8.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 13436
debian DSA-934
gentoo GLSA-200504-29
misc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=307852
mlist [pound_list] 20050426 remote buffer overflow in pound 1.8.2 + question abotu Host header
osvdb 15963
sectrack 1013824
secunia
  • 15142
  • 15202
  • 15679
  • 18381
vupen ADV-2005-0437
xf pound-addport-bo(20316)
Last major update 11-07-2017 - 01:32
Published 03-05-2005 - 04:00
Last modified 11-07-2017 - 01:32
Back to Top