Vulnerability Details : CVE-2005-2758
Integer signedness error in the administrative interface for Symantec AntiVirus Scan Engine 4.0 and 4.3 allows remote attackers to execute arbitrary code via crafted HTTP headers with negative values, which lead to a heap-based buffer overflow.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-2758
Probability of exploitation activity in the next 30 days: 1.95%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-2758
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2005-2758
-
http://www.securityfocus.com/bid/15001
-
http://www.symantec.com/avcenter/security/Content/2005.10.04.html
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/849209
US Government Resource
-
http://www.idefense.com/application/poi/display?id=314&type=vulnerabilities
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/22519
-
http://securityreason.com/securityalert/48
-
http://www.vupen.com/english/advisories/2005/1954
-
http://securitytracker.com/id?1015001
Products affected by CVE-2005-2758
- cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:clearswift:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:microsoft_sharepoint:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:caching:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:netapp_filer:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:netapp_netcache:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:bluecoat:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:clearswift:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus_scan_engine_for_network_attached_storage:4.3:*:*:*:*:*:*:*