All the vulnerabilites related to sophos - sophos_mailmonitor_for_notes_domino
cve-2005-1530
Vulnerability from cvelistv5
Published
2005-07-19 04:00
Modified
2024-08-07 21:51
Severity ?
EPSS score ?
Summary
Sophos Anti-Virus 5.0.1, with "Scan inside archive files" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large 'Extra field length' value.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14270 | vdb-entry, x_refsource_BID | |
http://www.idefense.com/application/poi/display?id=283&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1014488 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21373 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:51:50.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14270", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14270" }, { "name": "20050714 Sophos Anti-Virus Zip File Handling DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=283\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "1014488", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014488" }, { "name": "sophos-bzip2-dos(21373)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21373" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 5.0.1, with \"Scan inside archive files\" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large \u0027Extra field length\u0027 value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14270", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14270" }, { "name": "20050714 Sophos Anti-Virus Zip File Handling DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=283\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "1014488", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014488" }, { "name": "sophos-bzip2-dos(21373)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21373" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus 5.0.1, with \"Scan inside archive files\" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large \u0027Extra field length\u0027 value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14270", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14270" }, { "name": "20050714 Sophos Anti-Virus Zip File Handling DoS Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=283\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "1014488", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014488" }, { "name": "sophos-bzip2-dos(21373)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21373" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1530", "datePublished": "2005-07-19T04:00:00", "dateReserved": "2005-05-12T00:00:00", "dateUpdated": "2024-08-07T21:51:50.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-07-19 04:00
Modified
2024-11-20 23:57
Severity ?
Summary
Sophos Anti-Virus 5.0.1, with "Scan inside archive files" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large 'Extra field length' value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | sophos_anti-virus | 3.4.6 | |
sophos | sophos_anti-virus | 3.78 | |
sophos | sophos_anti-virus | 3.78d | |
sophos | sophos_anti-virus | 3.79 | |
sophos | sophos_anti-virus | 3.80 | |
sophos | sophos_anti-virus | 3.81 | |
sophos | sophos_anti-virus | 3.82 | |
sophos | sophos_anti-virus | 3.83 | |
sophos | sophos_anti-virus | 3.84 | |
sophos | sophos_anti-virus | 3.85 | |
sophos | sophos_anti-virus | 3.86 | |
sophos | sophos_anti-virus | 3.90 | |
sophos | sophos_anti-virus | 3.91 | |
sophos | sophos_anti-virus | 5.0.1 | |
sophos | sophos_mailmonitor | 2.0 | |
sophos | sophos_mailmonitor | 2.1 | |
sophos | sophos_mailmonitor_for_notes_domino | * | |
sophos | sophos_puremessage_anti-virus | 4.6 | |
sophos | sophos_small_business_suite | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "22A1739A-B77D-4CD6-9943-52B336EC2F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "40D4EB83-A8A4-48F2-A835-FA192ADB3BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "1609D51F-41D1-441C-9EA8-3F0510D8ED8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "3ABBFB36-0A7C-45ED-9907-867F31884113", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "23543D87-E4B6-4B74-A490-378D45AA3481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "E4DBC8E3-0344-413A-8C4A-F48CBAAFAB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "28C3AD19-26F4-4AFF-8207-86017509EECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC7217-88A6-4241-8FD9-4B7E2683F696", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "FDC8C9FC-9D35-455D-9597-3B2E63845B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "E07255F9-5726-4FDB-81A3-D0D55AD1F709", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "DD1A8D69-0A33-4F47-B1BA-8BC898A3E7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "06164FCF-CC47-406D-8561-DDA797B29673", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "A323A588-59DD-4D89-A224-A6FF7BBD7B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0756438F-DD69-4213-9069-FA613A5D729E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_mailmonitor:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "95FA3B01-F58C-45EB-9961-0A9BB8F6FE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_mailmonitor:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB699D72-7E6D-460C-AA5F-8BF9C4D4B196", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_mailmonitor_for_notes_domino:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FF0468B-81CF-484F-88C4-5F0E6CA8C4A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "1760B35D-15A5-413B-8C04-4A3668821ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "28059D6E-6505-408B-81FE-9B91FC9AE849", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 5.0.1, with \"Scan inside archive files\" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large \u0027Extra field length\u0027 value." }, { "lang": "es", "value": "Sophos Anti-Virus 5.0.1, con \"Scan inside archive files\" habilitado permite que atacantes remotos causen una denegaci\u00f3n de servicio (agotamiento de CPU por bucle infinito) mediante un archivo Bzip2 con un valor largo en \"Extra field length\"." } ], "id": "CVE-2005-1530", "lastModified": "2024-11-20T23:57:33.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-07-19T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014488" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=283\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/14270" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=283\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/14270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21373" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }