发布时间 :2000-05-01 00:00:00
修订时间 :2016-10-17 22:06:57

[原文]Buffer overflows in redirect.exe and changepw.exe in PDGSoft shopping cart allow remote attackers to execute arbitrary commands via a long query string.



- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20000525 Alert: PDG Cart Overflows
(UNKNOWN)  NTBUGTRAQ  20000525 Alert: PDG Cart Overflows
(UNKNOWN)  BID  1256

- 漏洞信息

高危 缓冲区溢出
2000-05-01 00:00:00 2005-10-20 00:00:00

- 公告与补丁

        The vendor has made available a patch for every affected platform.

- 漏洞信息

PDG Shopping Cart redirect.exe Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

A remote overflow exists in PDG Shopping Cart. The 'redirect.exe' script fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2000-05-25 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, PDG Software has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

PDGSoft Shopping Cart Multiple Buffer Overflow Vulnerabilities
Boundary Condition Error 1256
Yes Yes
2000-05-25 12:00:00 2009-07-11 01:56:00

- 受影响的程序版本

PDGSoft Shopping Cart 1.50

- 漏洞讨论

The two executables with the vulnerabilities are redirect.exe and changepw.exe both of which are accessible over the web. If supplied an overly long query string both will overflow an internal buffer overwriting the saved return address.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 解决方案

The vendor has made available a patch for every affected platform.

- 相关参考