Signedness error in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allows remote attackers to execute arbitrary code via long (1) Username, (2) Password, or (3) Hostname entries.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html | |
http://www.iss.net/security_center/static/9684.php | Vendor Advisory |
http://www.securityfocus.com/bid/5321 | Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html | |
http://www.iss.net/security_center/static/9684.php | Vendor Advisory |
http://www.securityfocus.com/bid/5321 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html - | |
References | () http://www.iss.net/security_center/static/9684.php - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/5321 - Patch, Vendor Advisory |
Information
Published : 2002-10-04 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-1062
Mitre link : CVE-2002-1062
CVE.ORG link : CVE-2002-1062
JSON object : View
Products Affected
t._hauck
- jana_web_server
CWE