|
|||
Rule General Information |
---|
Release Date: | 2019-08-30 | |
Rule Name: | MaxDB WebDBM GET Buffer Overflow Vulnerability (CVE-2005-0684) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent ("%") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:13368 http://dev.mysql.com/doc/maxdb/changes/changes_7.5.00.26.html#WebDAV http://www.idefense.com/application/poi/display?id=234&type=vulnerabilities http://www.idefense.com/application/poi/display?id=235&type=vulnerabilities |
|
Solutions |
---|
Please contact the software vendor to update the software patch. |