{ "id": "CVE-2005-1326", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", "lastModified": "2025-04-03T01:03:51.193", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in VooDoo cIRCle BOTNET before 1.0.33 allows remote authenticated attackers to cause a denial of service (client crash) via a crafted packet." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "9A598719-A542-48B8-87CC-D494DF215028" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "89BA0BF4-4B92-43B2-9389-0E9873564922" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "30724F53-0AA2-495E-8348-46352666E9B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "0E611909-BBE6-4FA9-817F-0C01F1707358" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "33D3EDDF-41C8-4781-966D-6A2FF4C5A397" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "B75E0C78-1130-49B6-BF07-C5510652023B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "8D5F6155-F593-4C10-94FD-7ED788F93B40" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "3F02ADDE-B663-4A89-B7CD-C694B713CA3F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "2CC9ABF3-AA25-450B-8A94-529403D81A19" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "CBECE6BE-BE79-4003-8FAD-AF3EE6A00ED2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "D415A312-7EC6-4B31-9F53-A952D822EB93" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "6630A66E-6BFD-4150-B4C6-1539EB76602A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "42A6B104-870F-4F3E-BC07-1B0753156542" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/15110", "source": "cve@mitre.org" }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=323254", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.osvdb.org/15830", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/15110", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=323254", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "http://www.osvdb.org/15830", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }