← Volver a CVEs
CVE-2005-0706
N/ADescripcion
Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado5/2/2005
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
grip:grip
Referencias
http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html(secalert@redhat.com)
http://secunia.com/advisories/32803(secalert@redhat.com)
http://secunia.com/advisories/33389(secalert@redhat.com)
http://secunia.com/advisories/33824(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200503-21.xml(secalert@redhat.com)
http://sourceforge.net/tracker/index.php?func=detail&aid=1160134&group_id=3714&atid=303714(secalert@redhat.com)
http://sourceforge.net/tracker/index.php?func=detail&aid=834724&group_id=3714&atid=103714(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-304.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2009-0005.html(secalert@redhat.com)
http://www.securityfocus.com/bid/12770(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152919(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19648(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10768(secalert@redhat.com)
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00429.html(secalert@redhat.com)
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00490.html(secalert@redhat.com)
https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00188.html(secalert@redhat.com)
http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/32803(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/33389(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/33824(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200503-21.xml(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/tracker/index.php?func=detail&aid=1160134&group_id=3714&atid=303714(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/tracker/index.php?func=detail&aid=834724&group_id=3714&atid=103714(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-304.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0005.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/12770(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152919(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19648(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10768(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00429.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00490.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00188.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.