Vulnerability Name: | CVE-2002-1652 (CCN-10595) | ||||||||
Assigned: | 2001-09-11 | ||||||||
Published: | 2001-09-11 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Buffer overflow in cgicso.c for cgiemail 1.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long query parameter. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2002-1652 Source: CCN Type: SECTRACK ID: 1002395 Cgiemail Web-based E-mail Remotely Executes Arbitrary Code With the Privileges of the Web Server Source: SECTRACK Type: Exploit 1002395 Source: CCN Type: US-CERT VU#185251 cgiemail web-based email system does not adequately validate user input thereby causing buffer overflow in cgisco.c Source: CERT-VN Type: US Government Resource VU#185251 Source: CCN Type: OSVDB ID: 11631 CGIEmail cgisco.c query Parameter Remote Overflow Source: MISC Type: Exploit http://www.securiteam.com/exploits/5TP0W005FE.html Source: BID Type: Exploit, Patch 6141 Source: CCN Type: BID-6141 CGIEmail Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN cgiemail-cgicso-get-bo(10595) Source: XF Type: UNKNOWN cgiemail-cgicso-get-bo(10595) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |