First published: Sat Mar 10 2007(Updated: )
Multiple buffer overflows in Conquest 8.2a and earlier (1) allow local users to gain privileges by querying a metaserver that sends a long server entry processed by metaGetServerList and allow remote metaservers to execute arbitrary code via a long server entry processed by metaGetServerList; (2) allow attackers to have an unknown impact by exceeding the configured number of metaservers; and allow remote attackers to corrupt memory via a SP_CLIENTSTAT packet with certain values of (3) unum or (4) snum, different vulnerabilities than CVE-2003-0933.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conquest | <=8.2a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1371 has been rated as a high severity vulnerability due to the potential for local users to gain elevated privileges and remote execution of arbitrary code.
The best way to mitigate CVE-2007-1371 is to upgrade to a version of Conquest that is newer than 8.2a.
The risks include privilege escalation for local users and the ability for remote attackers to execute arbitrary code on affected systems.
CVE-2007-1371 affects Radscan Conquest version 8.2a and all earlier versions.
Yes, CVE-2007-1371 can be exploited remotely through specially crafted server entries processed by the vulnerable metaGetServerList function.