CVE-2000-0592

Buffer overflows in POP3 service in WinProxy 2.0 and 2.0.1 allow remote attackers to execute arbitrary commands via long USER, PASS, LIST, RETR, or DELE commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sapporoworks:sapporoworks_winproxy:2.0:*:*:*:*:*:*:*
cpe:2.3:a:sapporoworks:sapporoworks_winproxy:2.0.1:*:*:*:*:*:*:*

History

07 Nov 2023, 01:55

Type Values Removed Values Added
References
  • {'url': 'http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006271417.GFE84146.-BJXON@lac.co.jp', 'name': '20000627 [SPSadvisory #37]WinProxy 2.0.0/2.0.1 DoS and Exploitable Buffer Overflow', 'tags': ['Exploit', 'Patch', 'Vendor Advisory'], 'refsource': 'BUGTRAQ'}
  • () http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006271417.GFE84146.-BJXON%40lac.co.jp -

Information

Published : 2000-06-27 04:00

Updated : 2024-02-28 10:24


NVD link : CVE-2000-0592

Mitre link : CVE-2000-0592

CVE.ORG link : CVE-2000-0592


JSON object : View

Products Affected

sapporoworks

  • sapporoworks_winproxy