First published: Wed May 11 2005(Updated: )
Integer signedness error in the qmail_put and substdio_put functions in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of SMTP RCPT TO commands.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dan Bernstein Qmail | ||
debian/netqmail | ||
debian/qmail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1515 is an integer signedness error in the qmail_put and substdio_put functions in qmail, which can lead to a denial of service and possible execution of arbitrary code.
CVE-2005-1515 affects the following software products: Dan Bernstein Qmail, netqmail (version 1.06-6.2~deb10u1), netqmail (version 1.06-6.2~) on Ubuntu Bionic, netqmail (version 1.06-6.2~) on Ubuntu Focal, netqmail (versions 1.06-6.2, 1.6-6.2~, 1.6-6.2~, 1.6-6.2~) with upstream patch on Ubuntu Xenial, and qmail (version 1.03-38) with upstream patch on Ubuntu.
The severity level of CVE-2005-1515 is medium.
CVE-2005-1515 can be exploited by sending a large number of SMTP RCPT TO commands, which can cause a denial of service and potentially execute arbitrary code.
Yes, you can refer to the following links for more information on CVE-2005-1515: [1] http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0101.html [2] http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html [3] http://securitytracker.com/id?1013911