ID

VAR-200512-0793


CVE

CVE-2005-4511


TITLE

TN3270 Resource Gateway Format string vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-559

DESCRIPTION

Format string vulnerability in TN3270 Resource Gateway 1.1.0 allows local users to cause a denial of service and possibly execute arbitrary code via format string specifiers in syslog function calls. Tn3270 Resource Gateway is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, resulting in a denial-of-service condition. This may be exploited to crash the service and may allow arbitrary code execution. Successful exploitation requires that a local user is able to input specially crafted resource strings into the database and e.g. tricking another user to run the affected software. The vulnerability has been reported in version 1.1.0. Prior versions may also be affected. SOLUTION: Update to version 1.1.1. PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=379592 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-4511 // BID: 86981 // VULHUB: VHN-15719 // PACKETSTORM: 42508

AFFECTED PRODUCTS

vendor:curtis hawthornemodel:tn3270 resource gatewayscope:eqversion:1.0.0

Trust: 1.6

vendor:curtis hawthornemodel:tn3270 resource gatewayscope:eqversion:1.1.0

Trust: 1.6

vendor:curtis hawthornemodel:tn3270 resource gatewayscope:eqversion:1.0.1

Trust: 1.6

vendor:curtismodel:hawthorne tn3270 resource gatewayscope:eqversion:1.1.0

Trust: 0.3

vendor:curtismodel:hawthorne tn3270 resource gatewayscope:eqversion:1.0.1

Trust: 0.3

vendor:curtismodel:hawthorne tn3270 resource gatewayscope:eqversion:1.0.0

Trust: 0.3

sources: BID: 86981 // CNNVD: CNNVD-200512-559 // NVD: CVE-2005-4511

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-4511
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200512-559
value: MEDIUM

Trust: 0.6

VULHUB: VHN-15719
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-4511
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-15719
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15719 // CNNVD: CNNVD-200512-559 // NVD: CVE-2005-4511

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-4511

THREAT TYPE

local

Trust: 1.0

sources: BID: 86981 // PACKETSTORM: 42508 // CNNVD: CNNVD-200512-559

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200512-559

EXTERNAL IDS

db:NVDid:CVE-2005-4511

Trust: 2.0

db:SECUNIAid:18185

Trust: 1.8

db:VUPENid:ADV-2005-3057

Trust: 1.7

db:XFid:23883

Trust: 0.9

db:CNNVDid:CNNVD-200512-559

Trust: 0.7

db:XFid:3270

Trust: 0.6

db:BIDid:86981

Trust: 0.4

db:VULHUBid:VHN-15719

Trust: 0.1

db:PACKETSTORMid:42508

Trust: 0.1

sources: VULHUB: VHN-15719 // BID: 86981 // PACKETSTORM: 42508 // CNNVD: CNNVD-200512-559 // NVD: CVE-2005-4511

REFERENCES

url:http://sourceforge.net/project/shownotes.php?release_id=379592

Trust: 2.1

url:http://secunia.com/advisories/18185

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/3057

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/23883

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/23883

Trust: 0.9

url:http://www.frsirt.com/english/advisories/2005/3057

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/18185/

Trust: 0.1

url:http://secunia.com/product/6642/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-15719 // BID: 86981 // PACKETSTORM: 42508 // CNNVD: CNNVD-200512-559 // NVD: CVE-2005-4511

CREDITS

Unknown

Trust: 0.3

sources: BID: 86981

SOURCES

db:VULHUBid:VHN-15719
db:BIDid:86981
db:PACKETSTORMid:42508
db:CNNVDid:CNNVD-200512-559
db:NVDid:CVE-2005-4511

LAST UPDATE DATE

2024-08-14T15:13:56.385000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15719date:2017-07-20T00:00:00
db:BIDid:86981date:2005-12-22T00:00:00
db:CNNVDid:CNNVD-200512-559date:2005-12-27T00:00:00
db:NVDid:CVE-2005-4511date:2017-07-20T01:29:16.923

SOURCES RELEASE DATE

db:VULHUBid:VHN-15719date:2005-12-23T00:00:00
db:BIDid:86981date:2005-12-22T00:00:00
db:PACKETSTORMid:42508date:2005-12-23T08:37:20
db:CNNVDid:CNNVD-200512-559date:2005-12-22T00:00:00
db:NVDid:CVE-2005-4511date:2005-12-23T01:03:00