Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/249219 | Exploit |
http://online.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3787 | Exploit Patch Vendor Advisory |
http://www.iss.net/security_center/static/7790.php | Vendor Advisory |
http://www.boozt.com/news_detail.php?id=3 | |
http://marc.info/?l=bugtraq&m=101027773404836&w=2 |
Configurations
Information
Published : 2002-03-24 21:00
Updated : 2016-10-17 19:16
NVD link : CVE-2002-0098
Mitre link : CVE-2002-0098
JSON object : View
CWE
Products Affected
boozt
- boozt_standard