Executive Summary

Informations
Name CVE-2009-5028 First vendor Publication 2011-11-29
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5028

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 154

Open Source Vulnerability Database (OSVDB)

Id Description
77348 Namazu result.c replace_field() Function uri Field Query Parsing Remote Overflow

Nessus® Vulnerability Scanner

Date Description
2013-11-29 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201311-22.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r...
http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2...
http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.8...
http://www.namazu.org/security.html
http://www.securityfocus.com/bid/50772
https://bugzilla.redhat.com/show_bug.cgi?id=756341
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 23:03:28
  • Multiple Updates
2024-11-28 12:20:42
  • Multiple Updates
2021-05-04 12:10:45
  • Multiple Updates
2021-04-22 01:11:14
  • Multiple Updates
2020-05-23 01:41:20
  • Multiple Updates
2020-05-23 00:24:53
  • Multiple Updates
2017-02-17 09:23:52
  • Multiple Updates
2017-02-08 09:31:28
  • Multiple Updates
2016-04-26 19:27:58
  • Multiple Updates
2014-02-17 10:52:57
  • Multiple Updates
2013-05-11 00:05:02
  • Multiple Updates