Vulnerability Details : CVE-2005-3182
Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3182
Probability of exploitation activity in the next 30 days: 16.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3182
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3182
-
http://securitytracker.com/id?1015046
-
http://www.securityfocus.com/bid/15081
Patch
-
http://securityreason.com/securityalert/74
-
http://kbase.gfi.com/showarticle.asp?id=KBID002451
Patch
-
http://marc.info/?l=bugtraq&m=112914475508191&w=2
-
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html
Products affected by CVE-2005-3182
- cpe:2.3:a:gfi:mailsecurity:8.1:*:exchange_smtp:*:*:*:*:*