Buffer overflow in defang in libhttpd.c for thttpd 2.21 to 2.23b1 allows remote attackers to execute arbitrary code via requests that contain '<' or '>' characters, which trigger the overflow when the characters are expanded to "<" and ">" sequences.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/8906 | patch vdb entry exploit broken link third party advisory |
https://www.debian.org/security/2003/dsa-396 | vendor advisory broken link |
http://secunia.com/advisories/10092 | patch vendor advisory broken link third party advisory |
http://www.osvdb.org/2729 | vdb entry broken link |
http://www.texonet.com/advisories/TEXONET-20030908.txt | broken link url repurposed |
http://marc.info/?l=bugtraq&m=106729188224252&w=2 | exploit mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13530 | third party advisory vdb entry |