Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1005893 | vdb entry |
http://www.securityfocus.com/bid/6537 | vdb entry patch |
http://secunia.com/advisories/7832 | third party advisory |
http://psoft.net/misc/webshell_patch.html | patch |
http://www.securityfocus.com/bid/6540 | vdb entry patch |
http://www.iss.net/security_center/static/10999.php | vdb entry patch |
http://www.securityfocus.com/archive/1/305313 | mailing list exploit patch vendor advisory |
http://www.securityfocus.com/bid/6527 | vdb entry |
http://www.iss.net/security_center/static/11003.php | vdb entry patch |
http://www.iss.net/security_center/static/11002.php | vdb entry patch |
http://www.securityfocus.com/bid/6538 | vdb entry patch |