CVE-2005-1326
Published May 2, 2005
Last updated 16 years ago
Overview
- Description
- Buffer overflow in VooDoo cIRCle BOTNET before 1.0.33 allows remote authenticated attackers to cause a denial of service (client crash) via a crafted packet.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A598719-A542-48B8-87CC-D494DF215028" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89BA0BF4-4B92-43B2-9389-0E9873564922" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30724F53-0AA2-495E-8348-46352666E9B3" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E611909-BBE6-4FA9-817F-0C01F1707358" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33D3EDDF-41C8-4781-966D-6A2FF4C5A397" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B75E0C78-1130-49B6-BF07-C5510652023B" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D5F6155-F593-4C10-94FD-7ED788F93B40" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F02ADDE-B663-4A89-B7CD-C694B713CA3F" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC9ABF3-AA25-450B-8A94-529403D81A19" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBECE6BE-BE79-4003-8FAD-AF3EE6A00ED2" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D415A312-7EC6-4B31-9F53-A952D822EB93" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6630A66E-6BFD-4150-B4C6-1539EB76602A" }, { "criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42A6B104-870F-4F3E-BC07-1B0753156542" } ], "operator": "OR" } ] } ]