CVE-2002-0098

Current Description

Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.

Basic Data

PublishedMarch 25, 2002
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationBooztBoozt Standard0.9.8*******

Vulnerable Software List

VendorProductVersions
Boozt Boozt Standard 0.9.8

References

NameSourceURLTags
20020105 BOOZT! Standard 's administration cgi vulnerable to buffer overflowhttp://marc.info/?l=bugtraq&m=101027773404836&w=2BUGTRAQ
20020109 BOOZT! Standard CGI Vulnerability : Exploit Releasedhttp://online.securityfocus.com/archive/1/249219BUGTRAQExploit
3787http://online.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3787BIDExploit Patch Vendor Advisory
http://www.boozt.com/news_detail.php?id=3http://www.boozt.com/news_detail.php?id=3CONFIRM
boozt-long-name-bo(7790)http://www.iss.net/security_center/static/7790.phpXFVendor Advisory