Vulnerabilities > CVE-2001-0029 - Buffer Overflow vulnerability in Igor Khasilev Oops Proxy Server 1.4.22
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in oops WWW proxy server 1.4.6 (and possibly other versions) allows remote attackers to execute arbitrary commands via a long host or domain name that is obtained from a reverse DNS lookup.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Oops! 1.4.6 (one russi4n proxy-server) Heap Buffer Overflow Exploit. CVE-2001-0029. Remote exploit for bsd platform |
id | EDB-ID:228 |
last seen | 2016-01-31 |
modified | 2000-12-15 |
published | 2000-12-15 |
reporter | diman |
source | https://www.exploit-db.com/download/228/ |
title | Oops! 1.4.6 one russi4n proxy-server Heap Buffer Overflow Exploit |
Nessus
NASL family | Web Servers |
NASL id | OOPS_OVERFLOW.NASL |
description | The remote server appears to be running ooops WWW proxy server version 1.4.6 or older. Such versions are reportedly affected by a buffer overflow vulnerability. A remote attacker might exploit this vulnerability to crash the server or execute arbitrary commands on the remote system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10578 |
published | 2000-12-13 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10578 |
title | oops WWW Proxy Server Reverse DNS Response Overflow |
code |
|