TUCoPS :: Web :: e-commerce, shopping carts :: pdgcart1.htm

UNIX/NT Web servers with PDGSoft's Cart. Buffer Overflow
Vulnerability

    PDGSoft Shopping Cart

Affected

    UNIX/NT Web servers with PDGSoft's Cart.

Description

    Following  is  based  on  Cerberus  Information Security Advisory.
    The Cerberus Security Team has discovered two buffer overflows  in
    two  of  the  executables  that  come with PDGSoft's Shopping Cart
    These overruns  can be  exploited to  execute arbitrary  code by a
    remote attacker.

    The two executables with the vulnerabilities are redirect.exe  and
    changepw.exe  both  of  which  are  accessible  over  the web.  If
    supplied  an  overly  long  query  string  both  will  overflow an
    internal buffer overwriting the saved return address.

Solution

    The vendor has made available a patch for every affected platform.
    See

        http://www.pdgsoft.com/Security/security2.html

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH