Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
References
Configurations
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-021.0.txt - | |
References | () http://marc.info/?l=bugtraq&m=105154413326136&w=2 - | |
References | () http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-008.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2003-036.html - | |
References | () http://www.securityfocus.com/bid/7303 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11072 - |
Information
Published : 2003-01-17 05:00
Updated : 2024-11-20 23:41
NVD link : CVE-2002-1391
Mitre link : CVE-2002-1391
CVE.ORG link : CVE-2002-1391
JSON object : View
Products Affected
gert_doering
- mgetty
CWE