Vulnerabilities > CVE-2002-0467
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflows in Ecartis (formerly Listar) 1.0.0 before snapshot 20020125 allows remote attackers to execute arbitrary code via (1) address_match() of mystring.c or (2) other functions in tolist.c.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-123.NASL |
description | Janusz Niewiadomski and Wojciech Purczynski reported a buffer overflow in the address_match of listar (a listserv style mailing-list manager). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14960 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14960 |
title | Debian DSA-123-1 : listar - remote exploit |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html
- http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html
- http://www.debian.org/security/2002/dsa-123
- http://www.debian.org/security/2002/dsa-123
- http://www.ecartis.org/
- http://www.ecartis.org/
- http://www.iss.net/security_center/static/8284.php
- http://www.iss.net/security_center/static/8284.php
- http://www.securityfocus.com/archive/1/261209
- http://www.securityfocus.com/archive/1/261209
- http://www.securityfocus.com/bid/4176
- http://www.securityfocus.com/bid/4176