Buffer overflows in DayDream BBS 2.9 through 2.13 allow remote attackers to possibly execute arbitrary code via the control codes (1) ~#MC, (2) ~#TF, or (3) ~#RA.
References
Link | Resource |
---|---|
http://www.cs.uku.fi/~hlyytine/daydream-2.11/ChangeLog | |
http://www.iss.net/security_center/static/7755.php | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/247708 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/3757 | Patch Vendor Advisory |
http://www.cs.uku.fi/~hlyytine/daydream-2.11/ChangeLog | |
http://www.iss.net/security_center/static/7755.php | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/247708 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/3757 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cs.uku.fi/~hlyytine/daydream-2.11/ChangeLog - | |
References | () http://www.iss.net/security_center/static/7755.php - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/247708 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3757 - Patch, Vendor Advisory |
Information
Published : 2001-12-30 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1207
Mitre link : CVE-2001-1207
CVE.ORG link : CVE-2001-1207
JSON object : View
Products Affected
daydream
- daydream_bbs
CWE