The prozilla package in Debian is vulnerable to a remote arbitrary code execution due to a buffer overflow and is fixed by upgrading to version 1.3.6-3woody3
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
OpenVAS | Debian Security Advisory DSA 834-1 (prozilla) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-834-1) | 17 Jan 200800:00 | – | openvas |
OSV | prozilla - buffer overflow | 1 Oct 200500:00 | – | osv |
Cvelist | CVE-2005-2961 | 5 Oct 200504:00 | – | cvelist |
NVD | CVE-2005-2961 | 5 Oct 200519:02 | – | nvd |
CVE | CVE-2005-2961 | 5 Oct 200519:02 | – | cve |
Exploit DB | Prozilla 1.3.7.4 - 'ftpsearch' Results Handling Buffer Overflow | 2 Oct 200500:00 | – | exploitdb |
Debian | [SECURITY] [DSA 834-1] New prozilla packages fix arbitrary code execution | 1 Oct 200506:54 | – | debian |
Tenable Nessus | Debian DSA-834-1 : prozilla - buffer overflow | 5 Oct 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | hppa | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_hppa.deb |
Debian | 3 | i386 | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_i386.deb |
Debian | 3 | mips | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_mips.deb |
Debian | 3 | m68k | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_m68k.deb |
Debian | 3 | alpha | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_alpha.deb |
Debian | 3 | mipsel | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_mipsel.deb |
Debian | 3 | powerpc | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_powerpc.deb |
Debian | 3 | all | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_all.deb |
Debian | 3 | arm | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_arm.deb |
Debian | 3 | s390 | prozilla | 1:1.3.6-3woody3 | prozilla_1:1.3.6-3woody3_s390.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo