First published: Fri Jul 20 2001(Updated: )
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetWin dMail | =2.5d | |
NetWin dMail | =2.7 | |
NetWin dMail | =2.7q | |
NetWin dMail | =2.7r | |
NetWin dMail | =2.8e | |
NetWin dMail | =2.8f | |
NetWin dMail | =2.8g | |
NetWin dMail | =2.8h | |
NetWin dMail | =2.8i | |
SurgeFTP | =1.0b | |
SurgeFTP | =2.0a | |
SurgeFTP | =2.0b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1355 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2001-1355, update affected software packages to the latest version provided by NetWin.
CVE-2001-1355 affects NetWin DMail versions 2.5d through 2.8e and SurgeFTP versions 1.0b and 2.0a.
CVE-2001-1355 is a buffer overflow vulnerability.
Yes, CVE-2001-1355 can be exploited remotely via specially crafted arguments in specific command executions.