Vulnerability Details : CVE-2005-0830
Multiple buffer overflows in Xzabite DYNDNSUpdate 0.6.15 and earlier, including the ipcheck function in dyndnsupdate.c, allow remote attackers who spoof a dyndns.org server to execute arbitrary code via unknown vectors.
Vulnerability category: Execute code
Products affected by CVE-2005-0830
- cpe:2.3:a:xzabite:dyndnsupdate:0.6.15:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0830
2.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0830
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-0830
-
http://bugs.gentoo.org/show_bug.cgi?id=84659
Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200503-27.xml
Vendor Advisory
Jump to