Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=listar-support&m=101590272221720&w=2 - | |
References | () http://online.securityfocus.com/archive/1/269658 - Vendor Advisory | |
References | () http://online.securityfocus.com/archive/1/269879 - Vendor Advisory | |
References | () http://online.securityfocus.com/archive/82/258763 - Vendor Advisory | |
References | () http://www.ecartis.org/ - | |
References | () http://www.iss.net/security_center/static/8445.php - | |
References | () http://www.securityfocus.com/archive/1/261209 - | |
References | () http://www.securityfocus.com/bid/4271 - |
Information
Published : 2002-08-12 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0468
Mitre link : CVE-2002-0468
CVE.ORG link : CVE-2002-0468
JSON object : View
Products Affected
ecartis
- ecartis
listar
- listar
CWE