Vulnerabilities > CVE-2004-1299 - Unspecified vulnerability in Vilistextum 2.6.6
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in the get_attr function in html.c for vilistextum 2.6.6 allows remote attackers to execute arbitrary code via a crafted web page.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Vilistextum 2.6.6 HTML Attribute Parsing Buffer Overflow Vulnerability. CVE-2004-1299. Remote exploits for multiple platform |
id | EDB-ID:24983 |
last seen | 2016-02-03 |
modified | 2004-12-15 |
published | 2004-12-15 |
reporter | Ariel Berkman |
source | https://www.exploit-db.com/download/24983/ |
title | Vilistextum 2.6.6 HTML Attribute Parsing Buffer Overflow Vulnerability |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200501-10.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200501-10 (Vilistextum: Buffer overflow vulnerability) Ariel Berkman discovered that Vilistextum unsafely reads data into an array without checking the length. This code vulnerability may lead to a buffer overflow. Impact : A remote attacker could craft a malicious webpage which, when converted, would result in the execution of arbitrary code with the rights of the user running Vilistextum. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16401 |
published | 2005-02-14 |
reporter | This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16401 |
title | GLSA-200501-10 : Vilistextum: Buffer overflow vulnerability |
code |
|