Format string vulnerability in Foundstone FScan 1.12 with banner grabbing enabled allows remote attackers to execute arbitrary code on the scanning system via format string specifiers in the server banner.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/268581 | Vendor Advisory |
http://www.foundstone.com/knowledge/fscan112_advisory.html | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8895.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/4549 | Patch Vendor Advisory |
http://online.securityfocus.com/archive/1/268581 | Vendor Advisory |
http://www.foundstone.com/knowledge/fscan112_advisory.html | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8895.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/4549 | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/268581 - Vendor Advisory | |
References | () http://www.foundstone.com/knowledge/fscan112_advisory.html - Patch, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/8895.php - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4549 - Patch, Vendor Advisory |
Information
Published : 2002-06-18 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0598
Mitre link : CVE-2002-0598
CVE.ORG link : CVE-2002-0598
JSON object : View
Products Affected
foundstone
- fscan
CWE