CVE-2003-1228

Buffer overflow in the prepare_reply function in request.c for Mathopd 1.2 through 1.5b13, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via an HTTP request with a long path.
References
Link Resource
http://marc.info/?l=bugtraq&m=107064887507504&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=107090601705839&w=2 Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/10385/ Third Party Advisory
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/9871 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=107064887507504&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=107090601705839&w=2 Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/10385/ Third Party Advisory
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html Exploit Third Party Advisory
http://www.securityfocus.com/bid/9871 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mathopd:mathopd:*:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:-:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:beta13:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=107064887507504&w=2 - Issue Tracking, Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=107064887507504&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=107090601705839&w=2 - Issue Tracking, Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=107090601705839&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/10385/ - Third Party Advisory () http://secunia.com/advisories/10385/ - Third Party Advisory
References () http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Third Party Advisory () http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/9871 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/9871 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - Third Party Advisory, VDB Entry

01 Jun 2021, 14:17

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-120
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=107090601705839&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=107090601705839&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References (MISC) http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Patch (MISC) http://www.securiteam.com/unixfocus/5FP0C1FCAW.html - Exploit, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/10385/ - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/10385/ - Third Party Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=107064887507504&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=107064887507504&w=2 - Issue Tracking, Mailing List, Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/9871 - Exploit, Patch (BID) http://www.securityfocus.com/bid/9871 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:mathopd:mathopd:1.3_p4:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5_b13:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p18:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p5:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.4_p1:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p7:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p17:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p6:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.3_p8:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:*:*:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:beta13:*:*:*:*:*:*
cpe:2.3:a:mathopd:mathopd:1.5:-:*:*:*:*:*:*

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1228

Mitre link : CVE-2003-1228

CVE.ORG link : CVE-2003-1228


JSON object : View

Products Affected

mathopd

  • mathopd
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')