Executive Summary

Informations
NameCVE-2005-2070First vendor Publication2005-06-29
VendorCveLast vendor Modification2008-09-05

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2070

CPE : Common Platform Enumeration

TypeDescriptionCount
Application33

OpenVAS Exploits

DateDescription
2008-01-17Name : Debian Security Advisory DSA 737-1 (clamav)
File : nvt/deb_737_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
17562ClamAV clamav-milter Remote Connection Hold DoS

Nessus® Vulnerability Scanner

DateDescription
2012-01-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO
2005-07-20Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2005_038.nasl - Type : ACT_GATHER_INFO
2005-07-06Name : The remote Debian host is missing a security-related update.
File : debian_DSA-737.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/14047
BUGTRAQ http://seclists.org/lists/bugtraq/2005/Jun/0197.html
DEBIAN http://www.debian.org/security/2005/dsa-737
SUSE http://www.novell.com/linux/security/advisories/2005_38_clamav.html

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:31:54
  • Multiple Updates
2013-05-11 11:28:09
  • Multiple Updates