Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/198293 | Vendor Advisory |
http://www.securityfocus.com/bid/3077 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6865 | |
http://online.securityfocus.com/archive/1/198293 | Vendor Advisory |
http://www.securityfocus.com/bid/3077 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6865 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/198293 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3077 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6865 - |
Information
Published : 2001-07-20 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1355
Mitre link : CVE-2001-1355
CVE.ORG link : CVE-2001-1355
JSON object : View
Products Affected
netwin
- dmail
- surgeftp
CWE