The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html | Vendor Advisory |
http://www.securityfocus.com/bid/2530 | Exploit Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html | Vendor Advisory |
http://www.securityfocus.com/bid/2530 | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2530 - Exploit, Patch, Vendor Advisory |
Information
Published : 2001-06-18 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0398
Mitre link : CVE-2001-0398
CVE.ORG link : CVE-2001-0398
JSON object : View
Products Affected
ritlabs
- the_bat
CWE