Buffer overflows in Ecartis (formerly Listar) 1.0.0 before snapshot 20020125 allows remote attackers to execute arbitrary code via (1) address_match() of mystring.c or (2) other functions in tolist.c.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/261209 | Vendor Advisory |
http://www.iss.net/security_center/static/8284.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/4176 | Patch Vendor Advisory |
http://www.debian.org/security/2002/dsa-123 | |
http://www.ecartis.org/ | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2002-08-11 21:00
Updated : 2008-09-05 13:28
NVD link : CVE-2002-0467
Mitre link : CVE-2002-0467
JSON object : View
CWE
Products Affected
ecartis
- ecartis
listar
- listar