Generated remediation guidance and an executive summary. No account required.
Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump.
Use Barracuda Networks vendor hub and Barracuda Spam Firewall product page to widen CVE-2005-2849 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2007-1673, CVE-2007-1669 and CVE-2006-4081 for nearby disclosures in the same product family. Additional editorial context is available in Why “Low” and “Medium” CVEs Still Breach Networks.