Vulnerability Description
Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Boozt | Boozt Standard | 0.9.8 |
References
- http://marc.info/?l=bugtraq&m=101027773404836&w=2
- http://online.securityfocus.com/archive/1/249219Exploit
- http://online.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3787ExploitPatchVendor Advisory
- http://www.boozt.com/news_detail.php?id=3
- http://www.iss.net/security_center/static/7790.phpVendor Advisory
- http://marc.info/?l=bugtraq&m=101027773404836&w=2
- http://online.securityfocus.com/archive/1/249219Exploit
- http://online.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3787ExploitPatchVendor Advisory
- http://www.boozt.com/news_detail.php?id=3
- http://www.iss.net/security_center/static/7790.phpVendor Advisory
FAQ
What is CVE-2002-0098?
CVE-2002-0098 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.
How severe is CVE-2002-0098?
CVE-2002-0098 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0098?
Check the references section above for vendor advisories and patch information. Affected products include: Boozt Boozt Standard.