ABiSoft Baxter Buffer Overflow Vulnerability
BID:1947
Info
ABiSoft Baxter Buffer Overflow Vulnerability
| Bugtraq ID: | 1947 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 14 2000 12:00AM |
| Updated: | Nov 14 2000 12:00AM |
| Credit: | Posted to Bugtraq on November 14, 2000 by Vort-fu <[email protected]>. |
| Vulnerable: |
ABiSoft Baxter Y ABiSoft Baxter X |
| Not Vulnerable: | |
Discussion
ABiSoft Baxter Buffer Overflow Vulnerability
ABiSoft Baxter is an IRC client for the Be Operating System.
Baxter is susceptible to a buffer overflow attack. Unchecked buffers exists in the code that handles URLs. In the event that Baxter receives a URL containing over 500 characters, the application will crash when attempting to parse the data so that it may create a web-enabled link that can be opened in the default browser. Restarting Baxter is required in order to regain normal functionality.
ABiSoft Baxter is an IRC client for the Be Operating System.
Baxter is susceptible to a buffer overflow attack. Unchecked buffers exists in the code that handles URLs. In the event that Baxter receives a URL containing over 500 characters, the application will crash when attempting to parse the data so that it may create a web-enabled link that can be opened in the default browser. Restarting Baxter is required in order to regain normal functionality.
Solution / Fix
ABiSoft Baxter Buffer Overflow Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].