cve/2005/CVE-2005-1513.md

26 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2005-1513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1513)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.
### POC
#### Reference
- http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2020/May/42
- http://seclists.org/fulldisclosure/2023/Jun/2
- http://www.openwall.com/lists/oss-security/2020/05/19/8
- http://www.openwall.com/lists/oss-security/2023/06/06/3
#### Github
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/mdulin2/house-of-muney
- https://github.com/sagredo-dev/qmail