CVE-2005-1125
Published May 2, 2005
Last updated 16 years ago
Overview
- Description
- Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded applications, allows attackers to bypass libsafe protection and exploit other vulnerabilities before the _libsafe_die function call is completed.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D262BDF-A782-4843-A62A-D8E4A85DCD9B" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25908E92-AD76-4CD0-A194-C3DF80EA730F" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7281A0A9-BE74-4FD2-8201-105B49F4DE41" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "190E9A51-D9FD-4F35-93D6-D98CD8487684" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "191BFDD7-31A8-4ABC-B81D-D6848D3FF7C8" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91BACFC3-0634-47CD-B8C4-6CC7A420F8BB" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22DCBF5B-59C6-4740-BFE2-47DF929923BF" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8049AABC-72B1-4360-991E-B141E47DAC72" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F927CFC-B432-49BD-AA19-7F4B0E593FE6" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CD90005-E191-4E07-B432-B836ECC75349" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6565DBC4-0E63-4F18-9F49-A418C4111E99" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1595C2B-3A59-4BBD-92C0-632C858D428B" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "116A7D0C-0D20-44A9-A570-DBFE6D5D4127" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8310254F-FDD9-481D-9E2C-A5D5A29ECBEC" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE7409AC-B66F-4BEA-950C-EB3D698ACBFA" }, { "criteria": "cpe:2.3:a:avaya:libsafe:2.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "920D32B9-06B0-426C-981F-61730444AC4C" } ], "operator": "OR" } ] } ]