Описание
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-3429
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44167
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
- http://secunia.com/advisories/31323
- http://secunia.com/advisories/31380
- http://secunia.com/advisories/31866
- http://www.debian.org/security/2008/dsa-1626
- http://www.httrack.com/history.txt
- http://www.securityfocus.com/bid/30425
- http://www.venustech.com.cn/NewsInfo/124/2032.Html
- http://www.vupen.com/english/advisories/2008/2221/references
Связанные уязвимости
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.4 ...