First published: Mon Feb 12 2001(Updated: )
Buffer overflow in the HTML parsing code in oops WWW proxy server 1.5.2 and earlier allows remote attackers to execute arbitrary commands via a large number of " (quotation) characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oops Proxy Server | =1.4.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0028 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2001-0028, upgrade to oops WWW Proxy Server version 1.5.2 or later.
CVE-2001-0028 affects oops WWW Proxy Server versions 1.5.2 and earlier.
CVE-2001-0028 exploits occur when a remote attacker sends excessive quotation characters to the server.
The potential impacts of CVE-2001-0028 include unauthorized execution of arbitrary commands on the vulnerable server.