Buffer overflow in the prepare_reply function in request.c for Mathopd 1.2 through 1.5b13, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via an HTTP request with a long path.
References
Link | Resource |
---|---|
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/9871 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/10385/ | Third Party Advisory |
http://marc.info/?l=bugtraq&m=107064887507504&w=2 | Issue Tracking Mailing List Third Party Advisory |
http://marc.info/?l=bugtraq&m=107090601705839&w=2 | Issue Tracking Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-12-30 21:00
Updated : 2021-06-01 07:17
NVD link : CVE-2003-1228
Mitre link : CVE-2003-1228
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
mathopd
- mathopd