CVE-2003-1228

Buffer overflow in the prepare_reply function in request.c for Mathopd 1.2 through 1.5b13, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via an HTTP request with a long path.
References
Link Resource
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/9871 Third Party Advisory VDB Entry
http://secunia.com/advisories/10385/ Third Party Advisory
http://marc.info/?l=bugtraq&m=107064887507504&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=107090601705839&w=2 Issue Tracking Mailing List Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mathopd:mathopd:*:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:-:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:beta13:*:*:*:*:*:*

Information

Published : 2003-12-30 21:00

Updated : 2021-06-01 07:17


NVD link : CVE-2003-1228

Mitre link : CVE-2003-1228


JSON object : View

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Advertisement

dedicated server usa

Products Affected

mathopd

  • mathopd