CVE-2003-1247

Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:positive_software:h-sphere:2.3_rc3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://psoft.net/misc/webshell_patch.html - Patch () http://psoft.net/misc/webshell_patch.html - Patch
References () http://secunia.com/advisories/7832 - () http://secunia.com/advisories/7832 -
References () http://www.iss.net/security_center/static/10999.php - Patch () http://www.iss.net/security_center/static/10999.php - Patch
References () http://www.iss.net/security_center/static/11002.php - Patch () http://www.iss.net/security_center/static/11002.php - Patch
References () http://www.iss.net/security_center/static/11003.php - Patch () http://www.iss.net/security_center/static/11003.php - Patch
References () http://www.securityfocus.com/archive/1/305313 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/305313 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/6527 - () http://www.securityfocus.com/bid/6527 -
References () http://www.securityfocus.com/bid/6537 - Patch () http://www.securityfocus.com/bid/6537 - Patch
References () http://www.securityfocus.com/bid/6538 - Patch () http://www.securityfocus.com/bid/6538 - Patch
References () http://www.securityfocus.com/bid/6540 - Patch () http://www.securityfocus.com/bid/6540 - Patch
References () http://www.securitytracker.com/id?1005893 - () http://www.securitytracker.com/id?1005893 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1247

Mitre link : CVE-2003-1247

CVE.ORG link : CVE-2003-1247


JSON object : View

Products Affected

positive_software

  • h-sphere