{"api_version":"1","generated_at":"2026-04-23T13:25:00+00:00","cve":"CVE-2005-3182","urls":{"html":"https://cve.report/CVE-2005-3182","api":"https://cve.report/api/cve/CVE-2005-3182.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3182","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3182"},"summary":{"title":"CVE-2005-3182","description":"Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests.  NOTE: the vendor suggests that this issues is \"in an underlying Microsoft technology\" which, if true, could mean that the overflow affects other products as well.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-10-20 10:02:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=112914475508191&w=2","name":"http://marc.info/?l=bugtraq&m=112914475508191&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kbase.gfi.com/showarticle.asp?id=KBID002451","name":"http://kbase.gfi.com/showarticle.asp?id=KBID002451","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"GFI Knowledge Base Article","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/19926","name":"http://www.osvdb.org/19926","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://securitytracker.com/id?1015046","name":"http://securitytracker.com/id?1015046","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - GFI MailSecurity Web Module Buffer Overflow in Processing HTTP Headers Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html","name":"http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Neohapsis Archives - Full Disclosure List - #0290 - [Full-disclosure] [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/17136/","name":"http://secunia.com/advisories/17136/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - GFI MailSecurity HTTP Management Interface Buffer Overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15081","name":"http://www.securityfocus.com/bid/15081","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"GFI MailSecurity for Exchange/SMTP Web Interface Remote Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityreason.com/securityalert/74","name":"http://securityreason.com/securityalert/74","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3182","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3182","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gfi","cpe5":"mailsecurity","cpe6":"8.1","cpe7":"*","cpe8":"exchange_smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T23:01:58.793Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1015046","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015046"},{"name":"15081","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15081"},{"name":"74","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/74"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=112914475508191&w=2"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html"},{"name":"17136","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17136/"},{"name":"19926","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/19926"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kbase.gfi.com/showarticle.asp?id=KBID002451"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-10-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests.  NOTE: the vendor suggests that this issues is \"in an underlying Microsoft technology\" which, if true, could mean that the overflow affects other products as well."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-10-17T13:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1015046","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015046"},{"name":"15081","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15081"},{"name":"74","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/74"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=112914475508191&w=2"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html"},{"name":"17136","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17136/"},{"name":"19926","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/19926"},{"tags":["x_refsource_CONFIRM"],"url":"http://kbase.gfi.com/showarticle.asp?id=KBID002451"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-3182","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests.  NOTE: the vendor suggests that this issues is \"in an underlying Microsoft technology\" which, if true, could mean that the overflow affects other products as well."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1015046","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015046"},{"name":"15081","refsource":"BID","url":"http://www.securityfocus.com/bid/15081"},{"name":"74","refsource":"SREASON","url":"http://securityreason.com/securityalert/74"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=112914475508191&w=2"},{"name":"20051012 [SEC-1 Advisory] GFI MailSecurity 8.1 Web Module Buffer Overflow","refsource":"FULLDISC","url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html"},{"name":"17136","refsource":"SECUNIA","url":"http://secunia.com/advisories/17136/"},{"name":"19926","refsource":"OSVDB","url":"http://www.osvdb.org/19926"},{"name":"http://kbase.gfi.com/showarticle.asp?id=KBID002451","refsource":"CONFIRM","url":"http://kbase.gfi.com/showarticle.asp?id=KBID002451"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-3182","datePublished":"2005-10-20T04:00:00.000Z","dateReserved":"2005-10-12T00:00:00.000Z","dateUpdated":"2024-08-07T23:01:58.793Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-10-20 10:02:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gfi:mailsecurity:8.1:*:exchange_smtp:*:*:*:*:*","matchCriteriaId":"2B9C96A8-9760-42E7-A773-2DC4482D2A34"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3182","Ordinal":"1","Title":"CVE-2005-3182","CVE":"CVE-2005-3182","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3182","Ordinal":"1","NoteData":"Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests.  NOTE: the vendor suggests that this issues is \"in an underlying Microsoft technology\" which, if true, could mean that the overflow affects other products as well.","Type":"Description","Title":"CVE-2005-3182"},{"CveYear":"2005","CveId":"3182","Ordinal":"2","NoteData":"2005-10-20","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3182","Ordinal":"3","NoteData":"2016-10-17","Type":"Other","Title":"Modified"}]}}}