First published: Fri Feb 02 2001(Updated: )
Buffer overflow in oops WWW proxy server 1.4.6 (and possibly other versions) allows remote attackers to execute arbitrary commands via a long host or domain name that is obtained from a reverse DNS lookup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oops Proxy Server | =1.4.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0029 has a high severity rating due to the potential for remote code execution.
To fix CVE-2001-0029, upgrade to a version of the Oops WWW proxy server that is not vulnerable, ideally 1.4.22 or later.
CVE-2001-0029 specifically affects Oops WWW proxy server version 1.4.6 and potentially other versions.
CVE-2001-0029 is classified as a buffer overflow vulnerability.
Yes, CVE-2001-0029 can be exploited remotely by sending specially crafted requests to the affected server.