CVE-2002-0332

Buffer overflows in xtell (xtelld) 1.91.1 and earlier, and 2.x before 2.7, allows remote attackers to execute arbitrary code via (1) a long DNS hostname that is determined using reverse DNS lookups, (2) a long AUTH string, or (3) certain data in the xtell request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xtell:xtell:1.91.1:*:*:*:*:*:*:*
cpe:2.3:a:xtell:xtell:2.6.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:38

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=101494896516467&w=2 - () http://marc.info/?l=bugtraq&m=101494896516467&w=2 -
References () http://www.debian.org/security/2002/dsa-121 - Patch, Vendor Advisory () http://www.debian.org/security/2002/dsa-121 - Patch, Vendor Advisory
References () http://www.iss.net/security_center/static/8312.php - () http://www.iss.net/security_center/static/8312.php -
References () http://www.securityfocus.com/bid/4193 - () http://www.securityfocus.com/bid/4193 -

Information

Published : 2002-06-25 04:00

Updated : 2024-11-20 23:38


NVD link : CVE-2002-0332

Mitre link : CVE-2002-0332

CVE.ORG link : CVE-2002-0332


JSON object : View

Products Affected

xtell

  • xtell