Vulnerability Details : CVE-2009-5028
Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-5028
Probability of exploitation activity in the next 30 days: 9.01%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-5028
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2009-5028
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-5028
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote Vulnerabilities
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities
-
http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=log
Patch
-
http://www.namazu.org/security.html
-
http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=log
Patch
-
http://www.securityfocus.com/bid/50772
-
https://bugzilla.redhat.com/show_bug.cgi?id=756341
Patch
-
http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=log
Patch
Products affected by CVE-2009-5028
- cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:namazu:namazu:2.0.17:*:*:*:*:*:*:*