{ "schema_version": "1.4.0", "id": "GHSA-h5m7-3pc5-qhhp", "modified": "2022-05-01T02:00:45Z", "published": "2022-05-01T02:00:45Z", "aliases": [ "CVE-2005-1666" ], "details": "Multiple buffer overflows in Orenosv HTTP/FTP Server 0.8.1 allow remote authenticated users to cause a denial of service (server crash) and possibly execute arbitrary code via long arguments to FTP commands such as MKD, RMD, or DELE, which are processed by the (1) ftp_xlate_path, (2) ftp_is_canonical, or (3) os_fn_nativize functions, or (4) a long SSI command that is processed by the parse_cmd function in cgissi.exe.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1666" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20510" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20512" }, { "type": "WEB", "url": "http://hp.vector.co.jp/authors/VA027031/orenosv/index_en.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/15302" }, { "type": "WEB", "url": "http://securitytracker.com/id?1013923" }, { "type": "WEB", "url": "http://www.osvdb.org/16165" }, { "type": "WEB", "url": "http://www.osvdb.org/16166" }, { "type": "WEB", "url": "http://www.securiteam.com/windowsntfocus/5FP0H00FPS.html" }, { "type": "WEB", "url": "http://www.security.org.sg/vuln/orenosv081.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/13546" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/13549" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/0499" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-05-18T04:00:00Z" } }