First published: Tue Jun 11 2002(Updated: )
Buffer overflow in Ns_PdLog function for the external database driver proxy daemon library (libnspd.a) of AOLServer 3.0 through 3.4.2 allows remote attackers to cause a denial of service or execute arbitrary code via the Error or Notice parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL Server | =3.2 | |
AOL Server | =3.1 | |
AOL Server | =3.3 | |
AOL Server | =3.0 | |
AOL Server | =3.4 | |
AOL Server | =3.2.1 | |
AOL Server | =3.3.1 | |
AOL Server | =3.4.2 | |
AOL Server | =3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0587 has a severity rating that indicates a significant risk of denial of service and potential remote code execution.
To fix CVE-2002-0587, update to AOL Server version 3.4.2 or later which addresses the buffer overflow issue.
CVE-2002-0587 affects AOL Server versions 3.0 to 3.4.2 inclusive.
The impacts of CVE-2002-0587 include denial of service and the ability for remote attackers to execute arbitrary code.
Yes, CVE-2002-0587 can be exploited remotely, allowing attackers to exploit the buffer overflow via specific parameters.