Buffer overflow in the prepare_reply function in request.c for Mathopd 1.2 through 1.5b13, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via an HTTP request with a long path.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=107090601705839&w=2 | issue tracking mailing list third party advisory |
http://www.securiteam.com/unixfocus/5FP0C1FCAW.html | third party advisory exploit |
http://secunia.com/advisories/10385/ | third party advisory |
http://marc.info/?l=bugtraq&m=107064887507504&w=2 | issue tracking mailing list third party advisory |
http://www.securityfocus.com/bid/9871 | vdb entry third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15474 | vdb entry third party advisory |