Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication.
Link | Tags |
---|---|
http://snapshot.ntop.org/ | |
http://marc.info/?l=bugtraq&m=101856541322245&w=2 | mailing list |
http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html | |
http://www.iss.net/security_center/static/8347.php | vdb entry patch vendor advisory |
http://www.osvdb.org/5307 | vdb entry |
http://marc.info/?l=bugtraq&m=101908224609740&w=2 | mailing list |
http://online.securityfocus.com/archive/1/259642 | mailing list vendor advisory |
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html | mailing list |
http://marc.info/?l=bugtraq&m=101854261030453&w=2 | mailing list |
http://www.securityfocus.com/bid/4225 | vdb entry patch vendor advisory |