Inktomi Traffic Server 4/5 - Traffic_Manager Path Argument Buffer Overflow
Author: Juliano Rizzo
type: dos
platform: linux
port:
date_added: 2002-06-25
date_updated: 2012-09-28
verified: 1
codes: CVE-2002-1013;OSVDB-5030
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/5098/info
Inktomi Traffic Server is a transparent web caching application. It is designed for use with Unix and Linux variants as well as Microsoft Windows operating environments.
A buffer overflow vulnerability has been reported in the Inktomi Traffic Server. The vulnerability occurs in the traffic_manager binary included with Inktomi Traffic Server.
Reportedly, executing traffic_manager with an excessively long commandline argument will cause the buffer overflow condition. As traffic_manager is a setuid root binary, it is possible for a remote attacker to obtain root, or superuser, privileges on a compromised system.
traffic_manager -path `perl -e 'print "A"x1720'` <