CVE-2005-1513

Description from NVD

Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.

Information Acquisition Date:2021-04-27T10:43Z
CVSS 2.0: 5.0 MEDIUM CVSS 3.x: 0.0 None

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:N/I:N/A:P

NVD References

 20050506 64 bit qmail fun
     source:FULLDISC
     tags:Exploit    
 http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html
     source:MISC
     tags:Exploit    
 1013911
     source:SECTRACK
     tags:Exploit    
 [oss-security] 20200519 Remote Code Execution in qmail (CVE-2005-1513)
     source:MLIST
     tags:
 [oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)
     source:MLIST
     tags:
 [oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)
     source:MLIST
     tags:
 20200522 Remote Code Execution in qmail (CVE-2005-1513)
     source:FULLDISC
     tags:
 http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html
     source:MISC
     tags:
 DSA-4692
     source:DEBIAN
     tags:
 [debian-lts-announce] 20200604 [SECURITY] [DLA 2234-1] netqmail security update
     source:MLIST
     tags:
 [oss-security] 20200616 Re: Remote Code Execution in qmail (CVE-2005-1513)
     source:MLIST
     tags:
 20200623 Re: Remote Code Execution in qmail (CVE-2005-1513)
     source:FULLDISC
     tags:
 http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html
     source:MISC
     tags:
 GLSA-202007-01
     source:GENTOO
     tags:
 USN-4556-1
     source:UBUNTU
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
http://newsbythehour.org/cybr32
http://canyoupwn.me7
https://www.openwall.com/lists/oss-security/2020/05/19/87
https://twitter.com/julianor/status/12628069321984327684
http://seclists.org/fulldisclosure/2020/May/423
http://Securitylab.ru3
https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code...3
http://tweetedtimes.com/r45c4l?s=tnp3
https://packetstormsecurity.com/files/158203/CVE-2005-1513....3

Information from Twitter

User URL Info Source Date
Jester0x01 https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code... Source Jester0x01       1618295532971257857 2023/01/26
Jester0x01 https://twitter.com/Jester0x01/status/1618295532971257857/p... Source Jester0x01       1618295532971257857 2023/01/26

List of frequently cited URLs

URLNum of Times Referred to
newsbythehour.org32
canyoupwn.me7
www.openwall.com7
twitter.com4
seclists.org3
Securitylab.ru3
www.qualys.com3
tweetedtimes.com3
packetstormsecurity.com3

Information from Twitter

User URL Info Source
Jester0x01 qualys.com Show Tweet
Jester0x01 twitter.com Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2023/01/26 Score : 0
Added Har-sia Database : 2020/05/20
Last Modified : 2023/01/26
Highest Scored Date : 2020/05/20
Highest Score : 53