CVE-2002-1816

Off-by-one buffer overflow in the sock_gets function in sockhelp.c for ATPhttpd 0.4b and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html Broken Link Exploit Vendor Advisory
http://secunia.com/advisories/7293 Broken Link Vendor Advisory
http://www.iss.net/security_center/static/10362.php Broken Link
http://www.securityfocus.com/bid/5956 Broken Link Exploit Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:redshift:atphttpd:*:*:*:*:*:*:*:*

History

15 Feb 2024, 21:28

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html - Broken Link, Exploit, Vendor Advisory
References () http://secunia.com/advisories/7293 - Vendor Advisory () http://secunia.com/advisories/7293 - Broken Link, Vendor Advisory
References () http://www.iss.net/security_center/static/10362.php - () http://www.iss.net/security_center/static/10362.php - Broken Link
References () http://www.securityfocus.com/bid/5956 - Exploit, Patch () http://www.securityfocus.com/bid/5956 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE NVD-CWE-Other CWE-193
First Time Redshift
Redshift atphttpd
CPE cpe:2.3:a:yann_ramin:atphttpd:0.4b:*:*:*:*:*:*:*
cpe:2.3:a:yann_ramin:atphttpd:0.4:*:*:*:*:*:*:*
cpe:2.3:a:redshift:atphttpd:*:*:*:*:*:*:*:*

Information

Published : 2002-12-31 05:00

Updated : 2024-02-15 21:28


NVD link : CVE-2002-1816

Mitre link : CVE-2002-1816

CVE.ORG link : CVE-2002-1816


JSON object : View

Products Affected

redshift

  • atphttpd
CWE
CWE-193

Off-by-one Error