Vulnerability Name: | CVE-2005-2903 (CCN-22203) | ||||||||
Assigned: | 2005-09-08 | ||||||||
Published: | 2005-09-08 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Heap-based buffer overflow in NOD32 2.5 with nod32.002 1.033 build 1127, with active scanning enabled, allows remote attackers to execute arbitrary code via an ARJ archive containing a file with a long filename. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-2903 Source: BUGTRAQ Type: UNKNOWN 20050908 Secunia Research: NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow Source: CCN Type: SA16604 NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow Source: SECUNIA Type: Vendor Advisory 16604 Source: MISC Type: Exploit, Patch, Vendor Advisory http://secunia.com/secunia_research/2005-40/advisory/ Source: CCN Type: NOD32 Download Web page Download the NOD32 Antivirus System Source: CCN Type: OSVDB ID: 19223 NOD32 Antivirus ARJ Archive Filename Overflow Source: BID Type: UNKNOWN 14773 Source: CCN Type: BID-14773 Eset Software NOD32 Antivirus ARJ Archive Handling Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN nod32-arj-archive-bo(22203) Source: XF Type: UNKNOWN nod32-arj-archive-bo(22203) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |