From 1f46576cd866d410b170808eaf035e6dde09c70e Mon Sep 17 00:00:00 2001 From: naddy Date: Sat, 3 Jul 2004 15:27:22 +0000 Subject: Pavuk HTTP Location header overflow --- security/vuxml/vuln.xml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 449dc3fdc0b..a8a4873a01e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,34 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + Pavuk HTTP Location header overflow + + + pavuk + 0.9.28_5 + + + + +

When pavuk sends a request to a web server and the server + sends back the HTTP status code 305 (Use Proxy), pavuk + copies data from the HTTP Location header in an unsafe + manner. This leads to a stack-based buffer overflow with + control over EIP.

+ +
+ + CAN-2004-0456 + http://lists.netsys.com/pipermail/full-disclosure/2004-July/023322.html + http://www.osvdb.org/7319 + + + 2004-06-30 + 2004-07-03 + +
+ Several vulnerabilities found in PHPNuke -- cgit