Moby Netsuite Remote Denial of Service Attack
BID:2411
Info
Moby Netsuite Remote Denial of Service Attack
| Bugtraq ID: | 2411 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 20 2001 12:00AM |
| Updated: | Feb 20 2001 12:00AM |
| Credit: | Reported to bugtraq by "Phiber" <[email protected]> on Mon, 19 Feb 2001. |
| Vulnerable: |
Mobydisk Moby Netsuite 1.0 |
| Not Vulnerable: | |
Discussion
Moby Netsuite Remote Denial of Service Attack
Excessive user-supplied input in URLs submitted to the server will cause a buffer overflow, crashing the program, requiring it to be restarted. This vulnerability may be exploitable as a stack overflow, allowing a remote attacker to execute arbitrary commands as the user of the webserver process.
Excessive user-supplied input in URLs submitted to the server will cause a buffer overflow, crashing the program, requiring it to be restarted. This vulnerability may be exploitable as a stack overflow, allowing a remote attacker to execute arbitrary commands as the user of the webserver process.
Exploit / POC
Moby Netsuite Remote Denial of Service Attack
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Moby Netsuite Remote Denial of Service Attack
Solution:
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.