Vulnerability Description
Format string vulnerability in PerlRTE_example1.pl in WASD 7.1, 7.2.0 through 7.2.3, and 8.0.0 allows remote attackers to execute arbitrary commands or crash the server via format strings in the $name variable.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wasd | Wasd Http Server | 7.1 |
References
- http://wasd.vsm.com.au/ht_root/doc/misc/wasd_advisory_020925.txtVendor Advisory
- http://www.iss.net/security_center/static/10213.phpPatch
- http://www.osvdb.org/21288
- http://www.securityfocus.com/archive/1/293229
- http://www.securityfocus.com/bid/5811Patch
- http://www.teaser.fr/~jlgailly/security/wasd-vuln-2002-09.txtVendor Advisory
- http://wasd.vsm.com.au/ht_root/doc/misc/wasd_advisory_020925.txtVendor Advisory
- http://www.iss.net/security_center/static/10213.phpPatch
- http://www.osvdb.org/21288
- http://www.securityfocus.com/archive/1/293229
- http://www.securityfocus.com/bid/5811Patch
- http://www.teaser.fr/~jlgailly/security/wasd-vuln-2002-09.txtVendor Advisory
FAQ
What is CVE-2002-1825?
CVE-2002-1825 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Format string vulnerability in PerlRTE_example1.pl in WASD 7.1, 7.2.0 through 7.2.3, and 8.0.0 allows remote attackers to execute arbitrary commands or crash the server via format strings in the $name...
How severe is CVE-2002-1825?
CVE-2002-1825 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1825?
Check the references section above for vendor advisories and patch information. Affected products include: Wasd Wasd Http Server.