Buffer overflow in defang in libhttpd.c for thttpd 2.21 to 2.23b1 allows remote attackers to execute arbitrary code via requests that contain '<' or '>' characters, which trigger the overflow when the characters are expanded to "<" and ">" sequences.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=106729188224252&w=2 | Exploit Mailing List |
http://secunia.com/advisories/10092 | Broken Link Patch Vendor Advisory |
http://www.osvdb.org/2729 | Broken Link |
http://www.securityfocus.com/bid/8906 | Broken Link Exploit Patch Third Party Advisory VDB Entry |
http://www.texonet.com/advisories/TEXONET-20030908.txt | Broken Link URL Repurposed |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13530 | Third Party Advisory VDB Entry |
https://www.debian.org/security/2003/dsa-396 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2003-11-03 05:00
Updated : 2024-02-14 01:17
NVD link : CVE-2003-0899
Mitre link : CVE-2003-0899
CVE.ORG link : CVE-2003-0899
JSON object : View
Products Affected
acme
- thttpd
CWE
CWE-131
Incorrect Calculation of Buffer Size