← Retour aux CVEs
CVE-2001-0949
N/ADescription
Buffer overflows in forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 allows remote attackers to execute arbitrary code via long arguments to the parameters (1) Mode, (2) Certificate_File, (3) useExpiredCRLs, (4) listenLength, (5) maxThread, (6) maxConnPerSite, (7) maxMsgLen, (8) exitTime, (9) blockTime, (10) nextUpdatePeriod, (11) buildLocal, (12) maxOCSPValidityPeriod, (13) extension, and (14) a particular combination of parameters associated with private key generation that form a string of a certain length.
Details CVE
Score CVSS v3.1N/A
Publie12/4/2001
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
valicert:enterprise_validation_authority
References
http://marc.info/?l=bugtraq&m=100749428517090&w=2(cve@mitre.org)
http://www.securityfocus.com/bid/3621(cve@mitre.org)
http://www.securityfocus.com/bid/3622(cve@mitre.org)
http://www.securityfocus.com/bid/3624(cve@mitre.org)
http://www.securityfocus.com/bid/3625(cve@mitre.org)
http://www.securityfocus.com/bid/3627(cve@mitre.org)
http://www.securityfocus.com/bid/3628(cve@mitre.org)
http://www.securityfocus.com/bid/3629(cve@mitre.org)
http://www.securityfocus.com/bid/3630(cve@mitre.org)
http://www.securityfocus.com/bid/3631(cve@mitre.org)
http://www.securityfocus.com/bid/3632(cve@mitre.org)
http://www.securityfocus.com/bid/3633(cve@mitre.org)
http://www.securityfocus.com/bid/3634(cve@mitre.org)
http://www.securityfocus.com/bid/3635(cve@mitre.org)
http://www.securityfocus.com/bid/3636(cve@mitre.org)
http://www.valicert.com/support/security_advisory_eva.html(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7652(cve@mitre.org)
http://marc.info/?l=bugtraq&m=100749428517090&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3621(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3622(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3624(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3625(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3627(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3628(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3629(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3630(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3631(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3632(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3633(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3634(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3635(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/3636(af854a3a-2127-422b-91ae-364da2661108)
http://www.valicert.com/support/security_advisory_eva.html(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7652(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.