Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2005-3832
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-26 Nov, 2005 | 19:03
Updated At-16 Apr, 2026 | 00:27

Stack-based buffer overflow in (1) CxUux60.dll and (2) CxUux60u.dll, as used in SpeedProject products including (a) Squeez 5.0 Build 4285, and (b) SpeedCommander 11.0 Build 4430 and 10.51 Build 4430, allows user-assisted attackers to execute arbitrary code via a ZIP archive containing a long filename.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 5.1
Base severity: MEDIUM
Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

speedproject
speedproject
>>speedcommander>>10.51_build4430
cpe:2.3:a:speedproject:speedcommander:10.51_build4430:*:*:*:*:*:*:*
speedproject
speedproject
>>speedcommander>>11.0_build4430
cpe:2.3:a:speedproject:speedcommander:11.0_build4430:*:*:*:*:*:*:*
speedproject
speedproject
>>squeez>>5.0_build_4285
cpe:2.3:a:speedproject:squeez:5.0_build_4285:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/17420cve@mitre.org
Patch
Vendor Advisory
http://secunia.com/secunia_research/2005-60/advisorycve@mitre.org
Patch
Vendor Advisory
http://securityreason.com/securityalert/204cve@mitre.org
N/A
http://securitytracker.com/id?1015265cve@mitre.org
Patch
Vendor Advisory
http://securitytracker.com/id?1015266cve@mitre.org
Patch
Vendor Advisory
http://securitytracker.com/id?1015267cve@mitre.org
Patch
Vendor Advisory
http://www.osvdb.org/21073cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/417588/30/0/threadedcve@mitre.org
N/A
http://www.vupen.com/english/advisories/2005/2570cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17420af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/secunia_research/2005-60/advisoryaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securityreason.com/securityalert/204af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015265af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securitytracker.com/id?1015266af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securitytracker.com/id?1015267af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.osvdb.org/21073af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/417588/30/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2005/2570af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://secunia.com/advisories/17420
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/secunia_research/2005-60/advisory
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/204
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015265
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015266
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015267
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.osvdb.org/21073
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/417588/30/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2005/2570
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/17420
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/secunia_research/2005-60/advisory
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/204
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015265
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015266
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.osvdb.org/21073
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/417588/30/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2005/2570
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Change History
0Changes found

Details not found