CVE-2005-1127 Affecting libnet-server-perl package, versions <0.89-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
10.11% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-LIBNETSERVERPERL-307432
  • published2 May 2005
  • disclosed2 May 2005

Introduced: 2 May 2005

CVE-2005-1127  (opens in a new tab)

How to fix?

Upgrade Debian:unstable libnet-server-perl to version 0.89-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libnet-server-perl package and not the libnet-server-perl package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.

CVSS Scores

version 3.1