Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply address, which is not properly handled when printing the header.
References
Link | Resource |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml | Patch Vendor Advisory |
http://bugs.gentoo.org/show_bug.cgi?id=83541 | Patch Vendor Advisory |
http://secunia.com/advisories/14487 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-03-05 21:00
Updated : 2008-09-05 13:47
NVD link : CVE-2005-0687
Mitre link : CVE-2005-0687
JSON object : View
CWE
Products Affected
hashcash
- hashcash