CVE-2005-2772 Affecting gopher package, versions <3.0.11


Severity

Recommended
0.0
high
0
10

Based on Debian security rating.

Threat Intelligence

EPSS
1.93% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-GOPHER-524412
  • published2 Sept 2005
  • disclosed2 Sept 2005

Introduced: 2 Sep 2005

CVE-2005-2772  (opens in a new tab)

How to fix?

Upgrade Debian:11 gopher to version 3.0.11 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gopher package and not the gopher package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long "+VIEWS:" reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function.

CVSS Scores

version 3.1