First published: Wed Nov 24 2004(Updated: )
Integer overflow in fetch on FreeBSD 4.1 through 5.3 allows remote malicious servers to execute arbitrary code via certain HTTP headers in an HTTP response, which lead to a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Fetch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1053 has a high severity level due to the potential for remote code execution.
To fix CVE-2004-1053, upgrade FreeBSD to a version that includes the patch for this vulnerability.
CVE-2004-1053 affects FreeBSD versions 4.1 through 5.3 that utilize the fetch command.
CVE-2004-1053 exploits an integer overflow vulnerability in the fetch command, leading to a buffer overflow.
Exploitation of CVE-2004-1053 can allow attackers to execute arbitrary code on affected systems.