Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://marc.info/?l=listar-support&m=101590272221720&w=2 - | |
| References | () http://online.securityfocus.com/archive/1/269658 - Vendor Advisory | |
| References | () http://online.securityfocus.com/archive/1/269879 - Vendor Advisory | |
| References | () http://online.securityfocus.com/archive/82/258763 - Vendor Advisory | |
| References | () http://www.ecartis.org/ - | |
| References | () http://www.iss.net/security_center/static/8445.php - | |
| References | () http://www.securityfocus.com/archive/1/261209 - | |
| References | () http://www.securityfocus.com/bid/4271 - | 
Information
                Published : 2002-08-12 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-0468
Mitre link : CVE-2002-0468
CVE.ORG link : CVE-2002-0468
JSON object : View
Products Affected
                ecartis
- ecartis
listar
- listar
CWE
                