CVE-2003-1228

Buffer overflow in the prepare_reply function in request.c for Mathopd 1.2 through 1.5b13, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via an HTTP request with a long path.
References
Link Resource
http://marc.info/?l=bugtraq&m=107064887507504&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=107090601705839&w=2 Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/10385/ Third Party Advisory
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/9871 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=107064887507504&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=107090601705839&w=2 Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/10385/ Third Party Advisory
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/9871 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mathopd:mathopd:*:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:-:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:beta13:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=107064887507504&w=2 - Issue Tracking, Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=107064887507504&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=107090601705839&w=2 - Issue Tracking, Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=107090601705839&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/10385/ - Third Party Advisory () http://secunia.com/advisories/10385/ - Third Party Advisory
References () http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Third Party Advisory () http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/9871 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/9871 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - Third Party Advisory, VDB Entry

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1228

Mitre link : CVE-2003-1228

CVE.ORG link : CVE-2003-1228


JSON object : View

Products Affected

mathopd

  • mathopd
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')