Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=101027773404836&w=2 | |
http://online.securityfocus.com/archive/1/249219 | Exploit |
http://online.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3787 | Exploit Patch Vendor Advisory |
http://www.boozt.com/news_detail.php?id=3 | |
http://www.iss.net/security_center/static/7790.php | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-06-25T04:00:00
Updated: 2002-03-22T10:00:00
Reserved: 2002-03-15T00:00:00
Link: CVE-2002-0098
JSON object: View
NVD Information
Status : Modified
Published: 2002-03-25T05:00:00.000
Modified: 2016-10-18T02:16:04.403
Link: CVE-2002-0098
JSON object: View
Redhat Information
No data.
CWE