CVE-2008-3429
31.07.2008, 22:41
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.Enginsight
Vendor | Product | Version |
---|---|---|
httrack | httrack | 0.23:beta-2 |
httrack | httrack | 0.24:beta-2 |
httrack | httrack | 0.25:beta-2 |
httrack | httrack | 0.99:beta-2 |
httrack | httrack | 0.996:beta-2 |
httrack | httrack | 0.997:beta-2 |
httrack | httrack | 0.998:beta-2 |
httrack | httrack | 1.00 |
httrack | httrack | 1.01 |
httrack | httrack | 1.02 |
httrack | httrack | 1.03 |
httrack | httrack | 1.04 |
httrack | httrack | 1.10 |
httrack | httrack | 1.10:b |
httrack | httrack | 1.10:c |
httrack | httrack | 1.10:d |
httrack | httrack | 1.10:e |
httrack | httrack | 1.11 |
httrack | httrack | 1.15 |
httrack | httrack | 1.15:b |
httrack | httrack | 1.16 |
httrack | httrack | 1.16:b |
httrack | httrack | 1.20 |
httrack | httrack | 1.21 |
httrack | httrack | 1.22 |
httrack | httrack | 1.23 |
httrack | httrack | 1.24 |
httrack | httrack | 1.30 |
httrack | httrack | 2.00 |
httrack | httrack | 2.01 |
httrack | httrack | 2.2 |
httrack | httrack | 2.02 |
httrack | httrack | 3.00 |
httrack | httrack | 3.01 |
httrack | httrack | 3.02 |
httrack | httrack | 3.03 |
httrack | httrack | 3.04 |
httrack | httrack | 3.05 |
httrack | httrack | 3.06 |
httrack | httrack | 3.07 |
httrack | httrack | 3.08 |
httrack | httrack | 3.09 |
httrack | httrack | 3.10 |
httrack | httrack | 3.15 |
httrack | httrack | 3.16:2 |
httrack | httrack | 3.20:2 |
httrack | httrack | 3.21:8 |
httrack | httrack | 3.22:3 |
httrack | httrack | 3.23 |
httrack | httrack | 3.30 |
httrack | httrack | 3.31 |
httrack | httrack | 3.32 |
httrack | httrack | 3.33 |
httrack | httrack | 3.40 |
httrack | httrack | 3.40:2 |
httrack | httrack | 3.41 |
httrack | httrack | 3.41:2 |
httrack | httrack | 3.41:3 |
httrack | httrack | 3.42 |
httrack | httrack | 3.42:2 |
httrack | httrack | 3.42:3 |
httrack | winhttrack | 𝑥 ≤ 3.42 |
httrack | winhttrack | 0.23:beta-2 |
httrack | winhttrack | 0.24:beta-2 |
httrack | winhttrack | 0.25:beta-2 |
httrack | winhttrack | 0.99:beta-2 |
httrack | winhttrack | 0.996:beta-2 |
httrack | winhttrack | 0.997:beta-2 |
httrack | winhttrack | 0.998:beta-2 |
httrack | winhttrack | 1.00 |
httrack | winhttrack | 1.01 |
httrack | winhttrack | 1.02 |
httrack | winhttrack | 1.03 |
httrack | winhttrack | 1.04 |
httrack | winhttrack | 1.10 |
httrack | winhttrack | 1.10:b |
httrack | winhttrack | 1.10:c |
httrack | winhttrack | 1.10:d |
httrack | winhttrack | 1.10:e |
httrack | winhttrack | 1.11 |
httrack | winhttrack | 1.15 |
httrack | winhttrack | 1.16 |
httrack | winhttrack | 1.16:b |
httrack | winhttrack | 1.20 |
httrack | winhttrack | 1.21 |
httrack | winhttrack | 1.22 |
httrack | winhttrack | 1.23 |
httrack | winhttrack | 1.24 |
httrack | winhttrack | 1.30 |
httrack | winhttrack | 2.00 |
httrack | winhttrack | 2.01 |
httrack | winhttrack | 2.02 |
httrack | winhttrack | 2.2 |
httrack | winhttrack | 3.00 |
httrack | winhttrack | 3.01 |
httrack | winhttrack | 3.02 |
httrack | winhttrack | 3.03 |
httrack | winhttrack | 3.04 |
httrack | winhttrack | 3.05 |
httrack | winhttrack | 3.06 |
httrack | winhttrack | 3.07 |
httrack | winhttrack | 3.08 |
httrack | winhttrack | 3.09 |
httrack | winhttrack | 3.10 |
httrack | winhttrack | 3.15 |
httrack | winhttrack | 3.15:b |
httrack | winhttrack | 3.16:2 |
httrack | winhttrack | 3.20:2 |
httrack | winhttrack | 3.21:8 |
httrack | winhttrack | 3.22:3 |
httrack | winhttrack | 3.23 |
httrack | winhttrack | 3.30 |
httrack | winhttrack | 3.31 |
httrack | winhttrack | 3.32 |
httrack | winhttrack | 3.33 |
httrack | winhttrack | 3.40 |
httrack | winhttrack | 3.40:2 |
httrack | winhttrack | 3.41 |
httrack | winhttrack | 3.41:2 |
httrack | winhttrack | 3.41:3 |
httrack | winhttrack | 3.42 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References