Vulnerability
PDGSoft Shopping Cart
Affected
UNIX/NT Web servers with PDGSoft's Cart.
Description
Following is based on Cerberus Information Security Advisory.
The Cerberus Security Team has discovered two buffer overflows in
two of the executables that come with PDGSoft's Shopping Cart
These overruns can be exploited to execute arbitrary code by a
remote attacker.
The two executables with the vulnerabilities are redirect.exe and
changepw.exe both of which are accessible over the web. If
supplied an overly long query string both will overflow an
internal buffer overwriting the saved return address.
Solution
The vendor has made available a patch for every affected platform.
See
http://www.pdgsoft.com/Security/security2.html
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH