CVE-2004-1005

Current Description

Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.

Basic Data

PublishedApril 14, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMidnight CommanderMidnight Commander4.5.40*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.41*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.42*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.43*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.44*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.45*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.46*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.47*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.48*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.49*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.50*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.51*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.52*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.54*******
    2.3ApplicationMidnight CommanderMidnight Commander4.5.55*******
    2.3ApplicationMidnight CommanderMidnight Commander4.6*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux3.0*******
    2.3OSDebianDebian Linux3.0*alpha*****
    2.3OSDebianDebian Linux3.0*arm*****
    2.3OSDebianDebian Linux3.0*hppa*****
    2.3OSDebianDebian Linux3.0*ia-32*****
    2.3OSDebianDebian Linux3.0*ia-64*****
    2.3OSDebianDebian Linux3.0*m68k*****
    2.3OSDebianDebian Linux3.0*mips*****
    2.3OSDebianDebian Linux3.0*mipsel*****
    2.3OSDebianDebian Linux3.0*ppc*****
    2.3OSDebianDebian Linux3.0*s-390*****
    2.3OSDebianDebian Linux3.0*sparc*****
    2.3OSGentooLinux********
    2.3OSRedhatEnterprise Linux2.1*advanced_server*****
    2.3OSRedhatEnterprise Linux2.1*advanced_server_ia64*****
    2.3OSRedhatEnterprise Linux2.1*workstation*****
    2.3OSRedhatEnterprise Linux2.1*workstation_ia64*****
    2.3OSRedhatLinux Advanced Workstation2.1*ia64*****
    2.3OSRedhatLinux Advanced Workstation2.1*itanium_processor*****
    2.3OSSuseSuse Linux8.0*******
    2.3OSSuseSuse Linux8.0*i386*****
    2.3OSSuseSuse Linux8.1*******
    2.3OSSuseSuse Linux8.2*******
    2.3OSSuseSuse Linux9.0*******
    2.3OSSuseSuse Linux9.0*x86_64*****
    2.3OSSuseSuse Linux9.1*******
    2.3OSSuseSuse Linux9.2*******
    2.3OSTurbolinuxTurbolinux Server7.0*******
    2.3OSTurbolinuxTurbolinux Server8.0*******
    2.3OSTurbolinuxTurbolinux Workstation7.0*******
    2.3OSTurbolinuxTurbolinux Workstation8.0*******

Vulnerable Software List

VendorProductVersions
Midnight Commander Midnight Commander 4.5.40, 4.5.41, 4.5.42, 4.5.43, 4.5.44, 4.5.45, 4.5.46, 4.5.47, 4.5.48, 4.5.49, 4.5.50, 4.5.51, 4.5.52, 4.5.54, 4.5.55, 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Turbolinux Turbolinux Server 7.0, 8.0
Turbolinux Turbolinux Workstation 7.0, 8.0
Suse Suse Linux 8.0, 8.1, 8.2, 9.0, 9.1, 9.2
Gentoo Linux *

References

NameSourceURLTags
13863http://secunia.com/advisories/13863/SECUNIAPatch Vendor Advisory
DSA-639http://www.debian.org/security/2005/dsa-639DEBIAN
GLSA-200502-24http://www.gentoo.org/security/en/glsa/glsa-200502-24.xmlGENTOO
RHSA-2005:217http://www.redhat.com/support/errata/RHSA-2005-217.htmlREDHATPatch Vendor Advisory
midnight-commander-bo(18898)https://exchange.xforce.ibmcloud.com/vulnerabilities/18898XF