Durian Web Application Server Remote Buffer Overflow Vulnerability
BID:21808
Info
Durian Web Application Server Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 21808 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 29 2006 12:00AM |
| Updated: | Jan 04 2007 06:27PM |
| Credit: | rgod is credited with discovering this vulnerability. |
| Vulnerable: |
Durian Web Application Server 3.02 |
| Not Vulnerable: | |
Discussion
Durian Web Application Server Remote Buffer Overflow Vulnerability
Durian Web Application Server is prone to a remote buffer-overflow vulnerability.
An attacker could exploit this issue to have arbitrary code execute in the context of an affected webserver. This may lead to the compromise of the webserver.
Durian Web Application Server 3.02 freeware for Windows is vulnerable to this issue; other versions may also be affected.
Durian Web Application Server is prone to a remote buffer-overflow vulnerability.
An attacker could exploit this issue to have arbitrary code execute in the context of an affected webserver. This may lead to the compromise of the webserver.
Durian Web Application Server 3.02 freeware for Windows is vulnerable to this issue; other versions may also be affected.
Exploit / POC
Durian Web Application Server Remote Buffer Overflow Vulnerability
The following exploit code is available:
The following exploit code is available:
Solution / Fix
Durian Web Application Server Remote Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any solutions for this issue. If you fell we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any solutions for this issue. If you fell we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Durian Web Application Server Remote Buffer Overflow Vulnerability
References:
References:
- Vendor HomePage (Durian)