{ "schema_version": "1.4.0", "id": "GHSA-cxrm-q29h-frv4", "modified": "2022-05-01T02:22:36Z", "published": "2022-05-01T02:22:36Z", "aliases": [ "CVE-2005-3912" ], "details": "Format string vulnerability in miniserv.pl Perl web server in Webmin before 1.250 and Usermin before 1.180, with syslog logging enabled, allows remote attackers to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format string specifiers in the username parameter to the login form, which is ultimately used in a syslog call. NOTE: the code execution might be associated with an issue in Perl.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3912" }, { "type": "WEB", "url": "http://lists.immunitysec.com/pipermail/dailydave/2005-November/002685.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17749" }, { "type": "WEB", "url": "http://secunia.com/advisories/17817" }, { "type": "WEB", "url": "http://secunia.com/advisories/17878" }, { "type": "WEB", "url": "http://secunia.com/advisories/17942" }, { "type": "WEB", "url": "http://secunia.com/advisories/18101" }, { "type": "WEB", "url": "http://secunia.com/advisories/22556" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1199" }, { "type": "WEB", "url": "http://www.dyadsecurity.com/webmin-0001.html" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-02.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:223" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_30_sr.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/418093/100/0/threaded" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2660" }, { "type": "WEB", "url": "http://www.webmin.com/changes-1.250.html" }, { "type": "WEB", "url": "http://www.webmin.com/security.html" }, { "type": "WEB", "url": "http://www.webmin.com/uchanges-1.180.html" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-11-30T11:03:00Z" } }