CVE-2001-0949

Buffer overflows in forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 allows remote attackers to execute arbitrary code via long arguments to the parameters (1) Mode, (2) Certificate_File, (3) useExpiredCRLs, (4) listenLength, (5) maxThread, (6) maxConnPerSite, (7) maxMsgLen, (8) exitTime, (9) blockTime, (10) nextUpdatePeriod, (11) buildLocal, (12) maxOCSPValidityPeriod, (13) extension, and (14) a particular combination of parameters associated with private key generation that form a string of a certain length.
References
Link Resource
http://marc.info/?l=bugtraq&m=100749428517090&w=2
http://www.securityfocus.com/bid/3621 Patch Vendor Advisory
http://www.securityfocus.com/bid/3622
http://www.securityfocus.com/bid/3624
http://www.securityfocus.com/bid/3625
http://www.securityfocus.com/bid/3627
http://www.securityfocus.com/bid/3628
http://www.securityfocus.com/bid/3629
http://www.securityfocus.com/bid/3630
http://www.securityfocus.com/bid/3631
http://www.securityfocus.com/bid/3632
http://www.securityfocus.com/bid/3633
http://www.securityfocus.com/bid/3634
http://www.securityfocus.com/bid/3635
http://www.securityfocus.com/bid/3636
http://www.valicert.com/support/security_advisory_eva.html Vendor Advisory URL Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/7652
http://marc.info/?l=bugtraq&m=100749428517090&w=2
http://www.securityfocus.com/bid/3621 Patch Vendor Advisory
http://www.securityfocus.com/bid/3622
http://www.securityfocus.com/bid/3624
http://www.securityfocus.com/bid/3625
http://www.securityfocus.com/bid/3627
http://www.securityfocus.com/bid/3628
http://www.securityfocus.com/bid/3629
http://www.securityfocus.com/bid/3630
http://www.securityfocus.com/bid/3631
http://www.securityfocus.com/bid/3632
http://www.securityfocus.com/bid/3633
http://www.securityfocus.com/bid/3634
http://www.securityfocus.com/bid/3635
http://www.securityfocus.com/bid/3636
http://www.valicert.com/support/security_advisory_eva.html Vendor Advisory URL Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/7652
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:valicert:enterprise_validation_authority:3.3:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.4:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.5:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.6:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.7:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.8:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.9:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.0:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.1:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.2:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=100749428517090&w=2 - () http://marc.info/?l=bugtraq&m=100749428517090&w=2 -
References () http://www.securityfocus.com/bid/3621 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/3621 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/3622 - () http://www.securityfocus.com/bid/3622 -
References () http://www.securityfocus.com/bid/3624 - () http://www.securityfocus.com/bid/3624 -
References () http://www.securityfocus.com/bid/3625 - () http://www.securityfocus.com/bid/3625 -
References () http://www.securityfocus.com/bid/3627 - () http://www.securityfocus.com/bid/3627 -
References () http://www.securityfocus.com/bid/3628 - () http://www.securityfocus.com/bid/3628 -
References () http://www.securityfocus.com/bid/3629 - () http://www.securityfocus.com/bid/3629 -
References () http://www.securityfocus.com/bid/3630 - () http://www.securityfocus.com/bid/3630 -
References () http://www.securityfocus.com/bid/3631 - () http://www.securityfocus.com/bid/3631 -
References () http://www.securityfocus.com/bid/3632 - () http://www.securityfocus.com/bid/3632 -
References () http://www.securityfocus.com/bid/3633 - () http://www.securityfocus.com/bid/3633 -
References () http://www.securityfocus.com/bid/3634 - () http://www.securityfocus.com/bid/3634 -
References () http://www.securityfocus.com/bid/3635 - () http://www.securityfocus.com/bid/3635 -
References () http://www.securityfocus.com/bid/3636 - () http://www.securityfocus.com/bid/3636 -
References () http://www.valicert.com/support/security_advisory_eva.html - Vendor Advisory, URL Repurposed () http://www.valicert.com/support/security_advisory_eva.html - Vendor Advisory, URL Repurposed
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7652 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/7652 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - Vendor Advisory (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - Vendor Advisory, URL Repurposed

Information

Published : 2001-12-04 05:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0949

Mitre link : CVE-2001-0949

CVE.ORG link : CVE-2001-0949


JSON object : View

Products Affected

valicert

  • enterprise_validation_authority