Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2005-3120

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-17 Oct, 2005 | 04:00
Updated At-07 Aug, 2024 | 23:01
Rejected At-
Credits

Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:17 Oct, 2005 | 04:00
Updated At:07 Aug, 2024 | 23:01
Rejected At:
â–¼CVE Numbering Authority (CNA)

Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securitytracker.com/id?1015065
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/18376
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17216
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17480
third-party-advisory
x_refsource_SECUNIA
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
vendor-advisory
x_refsource_TRUSTIX
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
vendor-advisory
x_refsource_SLACKWARE
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
vendor-advisory
x_refsource_OPENPKG
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
vendor-advisory
x_refsource_SCO
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
mailing-list
x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/435689/30/4740/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/17444
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1085
vendor-advisory
x_refsource_DEBIAN
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/18584
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17238
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2005_25_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/17150
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/17248
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
x_refsource_MISC
http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/419763/100/0/threaded
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/17360
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17445
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/15117
vdb-entry
x_refsource_BID
https://usn.ubuntu.com/206-1/
vendor-advisory
x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
vdb-entry
signature
x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2005-803.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/17231
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17230
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17340
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20383
third-party-advisory
x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
vendor-advisory
x_refsource_SCO
http://www.debian.org/security/2005/dsa-874
vendor-advisory
x_refsource_DEBIAN
http://www.debian.org/security/2005/dsa-876
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://securitytracker.com/id?1015065
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/18376
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17216
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17480
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
Resource:
vendor-advisory
x_refsource_SCO
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.securityfocus.com/archive/1/435689/30/4740/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/17444
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1085
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/18584
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17238
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2005_25_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/17150
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/17248
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
Resource:
x_refsource_MISC
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/419763/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/17360
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17445
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/15117
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://usn.ubuntu.com/206-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-803.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/17231
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17230
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20383
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
Resource:
vendor-advisory
x_refsource_SCO
Hyperlink: http://www.debian.org/security/2005/dsa-874
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.debian.org/security/2005/dsa-876
Resource:
vendor-advisory
x_refsource_DEBIAN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securitytracker.com/id?1015065
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/18376
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17216
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17480
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
vendor-advisory
x_refsource_SCO
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.securityfocus.com/archive/1/435689/30/4740/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/17444
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1085
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/18584
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17238
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2005_25_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/17150
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/17248
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
x_refsource_MISC
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/419763/100/0/threaded
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/17360
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17445
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/15117
vdb-entry
x_refsource_BID
x_transferred
https://usn.ubuntu.com/206-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.redhat.com/support/errata/RHSA-2005-803.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/17231
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17230
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20383
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
vendor-advisory
x_refsource_SCO
x_transferred
http://www.debian.org/security/2005/dsa-874
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.debian.org/security/2005/dsa-876
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://securitytracker.com/id?1015065
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/18376
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17216
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17480
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
Resource:
vendor-advisory
x_refsource_SCO
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/435689/30/4740/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/17444
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1085
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/18584
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17238
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2005_25_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/17150
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/17248
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/419763/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/17360
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17445
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/15117
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://usn.ubuntu.com/206-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-803.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/17231
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17230
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20383
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
Resource:
vendor-advisory
x_refsource_SCO
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-874
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.debian.org/security/2005/dsa-876
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:17 Oct, 2005 | 20:06
Updated At:03 Apr, 2025 | 01:03

Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

invisible-island
invisible-island
>>lynx>>Versions up to 2.8.6(inclusive)
cpe:2.3:a:invisible-island:lynx:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.0
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-131Primarynvd@nist.gov
CWE ID: CWE-131
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txtsecurity@debian.org
Broken Link
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txtsecurity@debian.org
Broken Link
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.htmlsecurity@debian.org
Broken Link
Patch
Vendor Advisory
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.htmlsecurity@debian.org
Broken Link
http://secunia.com/advisories/17150security@debian.org
Broken Link
http://secunia.com/advisories/17216security@debian.org
Broken Link
http://secunia.com/advisories/17230security@debian.org
Broken Link
http://secunia.com/advisories/17231security@debian.org
Broken Link
http://secunia.com/advisories/17238security@debian.org
Broken Link
http://secunia.com/advisories/17248security@debian.org
Broken Link
http://secunia.com/advisories/17340security@debian.org
Broken Link
http://secunia.com/advisories/17360security@debian.org
Broken Link
http://secunia.com/advisories/17444security@debian.org
Broken Link
http://secunia.com/advisories/17445security@debian.org
Broken Link
http://secunia.com/advisories/17480security@debian.org
Broken Link
http://secunia.com/advisories/18376security@debian.org
Broken Link
http://secunia.com/advisories/18584security@debian.org
Broken Link
http://secunia.com/advisories/20383security@debian.org
Broken Link
http://securitytracker.com/id?1015065security@debian.org
Broken Link
Third Party Advisory
VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056security@debian.org
Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2006-010.htmsecurity@debian.org
Third Party Advisory
http://www.debian.org/security/2005/dsa-874security@debian.org
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-876security@debian.org
Mailing List
Third Party Advisory
http://www.debian.org/security/2006/dsa-1085security@debian.org
Mailing List
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xmlsecurity@debian.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186security@debian.org
Third Party Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.htmlsecurity@debian.org
Broken Link
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.htmlsecurity@debian.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-803.htmlsecurity@debian.org
Broken Link
Vendor Advisory
http://www.securityfocus.com/archive/1/419763/100/0/threadedsecurity@debian.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/435689/30/4740/threadedsecurity@debian.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/15117security@debian.org
Broken Link
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253security@debian.org
Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257security@debian.org
Broken Link
https://usn.ubuntu.com/206-1/security@debian.org
Broken Link
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txtaf854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txtaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Patch
Vendor Advisory
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17150af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17216af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17230af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17231af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17238af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17248af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17340af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17360af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17444af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17445af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17480af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/18376af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/18584af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/20383af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://securitytracker.com/id?1015065af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2006-010.htmaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2005/dsa-874af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.debian.org/security/2005/dsa-876af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.debian.org/security/2006/dsa-1085af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-803.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.securityfocus.com/archive/1/419763/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/435689/30/4740/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/15117af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://usn.ubuntu.com/206-1/af854a3a-2127-422b-91ae-364da2661108
Broken Link
Hyperlink: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
Source: security@debian.org
Resource:
Broken Link
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
Source: security@debian.org
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17150
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17216
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17230
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17231
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17238
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17248
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17340
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17360
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17444
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17445
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17480
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18376
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18584
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/20383
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://securitytracker.com/id?1015065
Source: security@debian.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-874
Source: security@debian.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-876
Source: security@debian.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1085
Source: security@debian.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2005_25_sr.html
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
Source: security@debian.org
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-803.html
Source: security@debian.org
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/419763/100/0/threaded
Source: security@debian.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/435689/30/4740/threaded
Source: security@debian.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/15117
Source: security@debian.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
Source: security@debian.org
Resource:
Issue Tracking
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
Source: security@debian.org
Resource:
Broken Link
Hyperlink: https://usn.ubuntu.com/206-1/
Source: security@debian.org
Resource:
Broken Link
Hyperlink: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17150
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17216
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17230
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17231
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17238
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17248
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17340
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17360
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17444
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/17480
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18376
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/18584
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/20383
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://securitytracker.com/id?1015065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-874
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2005/dsa-876
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1085
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2005_25_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-803.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/419763/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/435689/30/4740/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/15117
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://usn.ubuntu.com/206-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found