Multiple buffer overflows in Tomahawk SteelArrow before 4.5 allow remote attackers to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/5495 | vdb entry |
http://www.steelarrow.com/ | |
http://www.securityfocus.com/bid/5496 | vdb entry |
http://www.iss.net/security_center/static/9890.php | vdb entry vendor advisory |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0085.html | mailing list |
http://www.nextgenss.com/advisories/steel-arrow-bo.txt | |
http://www.securityfocus.com/bid/4860 | vdb entry |
http://www.iss.net/security_center/static/9888.php | vdb entry vendor advisory |
http://www.securityfocus.com/bid/5494 | vdb entry |
http://www.iss.net/security_center/static/9889.php | vdb entry vendor advisory |
http://online.securityfocus.com/archive/1/288013 | vendor advisory mailing list |
http://www.nextgenss.com/vna/tom-saro.txt |