HTTrack URI Parsing Remote Buffer Overflow Vulnerability
BID:30425
Info
HTTrack URI Parsing Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 30425 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-3429 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 28 2008 12:00AM |
| Updated: | Apr 16 2015 06:05PM |
| Credit: | Joan Calvet |
| Vulnerable: |
HTTrack WinHTTrack 3.42-2 HTTrack WinHTTrack 3.42 HTTrack HTTrack 3.42-2 HTTrack HTTrack 3.42 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 m68k Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 |
| Not Vulnerable: |
HTTrack WinHTTrack 3.42-3 HTTrack HTTrack 3.42-3 |
Discussion
HTTrack URI Parsing Remote Buffer Overflow Vulnerability
HTTrack is prone to a remote buffer-overflow vulnerability because it fails to perform sufficient boundary checks when parsing long URIs.
Remote attackers can exploit this issue by enticing victims into crawling a malicious URI designed to exploit this issue.
Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service.
Versions prior to HTTrack 3.42-3 are vulnerable.
HTTrack is prone to a remote buffer-overflow vulnerability because it fails to perform sufficient boundary checks when parsing long URIs.
Remote attackers can exploit this issue by enticing victims into crawling a malicious URI designed to exploit this issue.
Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service.
Versions prior to HTTrack 3.42-3 are vulnerable.
Exploit / POC
HTTrack URI Parsing Remote Buffer Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
HTTrack URI Parsing Remote Buffer Overflow Vulnerability
Solution:
The vendor has released fixes. Please see the references for more information.
Solution:
The vendor has released fixes. Please see the references for more information.
References
HTTrack URI Parsing Remote Buffer Overflow Vulnerability
References:
References:
- HTTrack Homepage (Xavier Roche)
- HTTrack Website Copier release history (HTTrack)