CVE-2004-2086

Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sambar:sambar_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*

History

20 Nov 2024, 23:52

Type Values Removed Values Added
References () http://securitytracker.com/id?1008979 - Exploit, Vendor Advisory () http://securitytracker.com/id?1008979 - Exploit, Vendor Advisory
References () http://www.osvdb.org/5786 - Patch, Vendor Advisory () http://www.osvdb.org/5786 - Patch, Vendor Advisory
References () http://www.sambar.com/security.htm - Patch, Vendor Advisory () http://www.sambar.com/security.htm - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/82/353087 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/82/353087 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/9607 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/9607 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15071 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15071 -

Information

Published : 2004-02-06 05:00

Updated : 2024-11-20 23:52


NVD link : CVE-2004-2086

Mitre link : CVE-2004-2086

CVE.ORG link : CVE-2004-2086


JSON object : View

Products Affected

sambar

  • sambar_server