{ "id": "CVE-2005-4584", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-29T11:03:00.000", "lastModified": "2023-11-07T01:58:11.763", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "BZFlag server 2.0.4 and earlier allows remote attackers to cause a denial of service (application crash) via a callsign that is not followed by a NULL (\\0) character." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.0.4", "matchCriteriaId": "E493369E-9E6B-4EE3-B152-E444B143603B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_1:*:*:*:*:*:*:*", "matchCriteriaId": "39405043-3AC2-4F05-A4C1-3BE195B52629" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2:*:*:*:*:*:*:*", "matchCriteriaId": "34B84161-C71D-4628-96BB-53AB309A06CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_1:*:*:*:*:*:*:*", "matchCriteriaId": "DC41F6C1-C086-4566-AD15-3A168D84DB70" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_2:*:*:*:*:*:*:*", "matchCriteriaId": "1426A226-D457-4444-80CA-9A53C50A0516" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DB4C95-10FA-41A1-9788-FE5FA400F1B2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d1:*:*:*:*:*:*:*", "matchCriteriaId": "C4189A91-DB01-4C61-BB88-2020FAE9C589" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d2:*:*:*:*:*:*:*", "matchCriteriaId": "B6D72429-55F8-4432-9B1E-D5867AF19CBB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d3:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3055C-9706-4165-AB74-94AAB1D2BAD0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d4:*:*:*:*:*:*:*", "matchCriteriaId": "286A8DE6-FD52-42F4-A6AF-36799CEECD2E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d5:*:*:*:*:*:*:*", "matchCriteriaId": "E3E43F75-822D-4DF5-8CBB-854B069D1D72" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d6:*:*:*:*:*:*:*", "matchCriteriaId": "AE314C04-8ABC-4543-A963-76B80FD3675F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d7:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0820D-E31F-4308-8A2A-413B64B4AEDA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d8:*:*:*:*:*:*:*", "matchCriteriaId": "3375EC5B-7A6C-4DCC-8897-5D0A5F9673F8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d9:*:*:*:*:*:*:*", "matchCriteriaId": "B96CCB7A-A14C-41BF-B315-7BFF1D8343F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e:*:*:*:*:*:*:*", "matchCriteriaId": "2E2522F8-7AC4-4058-AF76-61177589B278" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e1:*:*:*:*:*:*:*", "matchCriteriaId": "0195ABCA-BDDB-41E7-BE34-8A7EAEDC063E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e2:*:*:*:*:*:*:*", "matchCriteriaId": "7E416437-2528-405A-A4F5-132399EBB6F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e4:*:*:*:*:*:*:*", "matchCriteriaId": "299E6D69-CED1-403E-ACA0-1B1B1923CE99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e6:*:*:*:*:*:*:*", "matchCriteriaId": "16D9A487-6B55-4D97-9B64-DDE908420817" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7g0:*:*:*:*:*:*:*", "matchCriteriaId": "5231E037-D966-4803-8F6B-E1F4C42705AE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7g2:*:*:*:*:*:*:*", "matchCriteriaId": "2A47E0BE-0A13-4FB1-B16B-677F2A7C9962" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C98A2DE-C6BD-42ED-B3E0-F0D2573BE3A8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFDE88AC-67A8-4575-85FC-03E1CF217899" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB8250CB-BA59-490D-A135-288D3D5FB695" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "6788DBC8-080A-45F8-AF06-9F3CAF699390" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "1CD22237-0800-4082-9DFA-656751D796C7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "144036C4-54EF-40E9-8ACA-1C4E9292C546" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bzflag:bzflag_server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD44A73B-ABF0-45C0-91C2-1F02E17AD6A0" } ] } ] } ], "references": [ { "url": "http://aluigi.altervista.org/adv/bzflagboom-adv.txt", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://cvs.sourceforge.net/viewcvs.py/%2Acheckout%2A/bzflag/bzflag/ChangeLog?rev=2.103", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/18238", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1015418", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.osvdb.org/22036", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/16066", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23872", "source": "cve@mitre.org" } ] }