Executive Summary
Summary | |
---|---|
Title | New junkbuster packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-713 | First vendor Publication | 2005-04-21 |
Vendor | Debian | Last vendor Modification | 2005-04-21 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several bugs have been found in junkbuster, a HTTP proxy and filter. The Common Vulnerability and Exposures project identifies the following vulnerabilities: CAN-2005-1108 James Ranson discovered that an attacker can modify the referrer setting with a carefully crafted URL by accidently overwriting a global variable. CAN-2005-1109 Tavis Ormandy from the Gentoo Security Team discovered several heap corruptions due to inconsistent use of an internal function that can crash the daemon or possibly lead to the execution of arbitrary code. For the stable distribution (woody) these problems have been fixed in version 2.0.2-0.2woody1. The unstable distribution (sid) doesn't contain the junkbuster package anymore. We recommend that you upgrade your junkbuster package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-713 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200504-11 (junkbuster) File : nvt/glsa_200504_11.nasl |
2008-09-04 | Name : FreeBSD Ports: junkbuster File : nvt/freebsd_junkbuster.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 713-1 (junkbuster) File : nvt/deb_713_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
15503 | Internet Junkbuster URL Filtering Heap Corruption JunkBuster contains a flaw that may allow a malicious user to modify the configuration setting. The issue is due to a heap corruption error in the filtering of URLs. When JunkBuster is configured to run in single-threaded mode, an attacker can modify the referrer setting with a specially crafted URL, resulting in a loss of confidentiality and integrity. |
15502 | Internet Junkbuster Referrer Modification |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_97edf5abb31911d9837d000e0c2e438a.nasl - Type : ACT_GATHER_INFO |
2005-04-22 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-713.nasl - Type : ACT_GATHER_INFO |
2005-04-14 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200504-11.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:00 |
|