[] NeoSense

Inktomi Traffic Server 4/5 - Traffic_Manager Path Argument Buffer Overflow

Author: Juliano Rizzo
type: dos
platform: linux
port: 
date_added: 2002-06-25 
date_updated: 2012-09-28 
verified: 1 
codes: CVE-2002-1013;OSVDB-5030 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/5098/info

Inktomi Traffic Server is a transparent web caching application. It is designed for use with Unix and Linux variants as well as Microsoft Windows operating environments.

A buffer overflow vulnerability has been reported in the Inktomi Traffic Server. The vulnerability occurs in the traffic_manager binary included with Inktomi Traffic Server.

Reportedly, executing traffic_manager with an excessively long commandline argument will cause the buffer overflow condition. As traffic_manager is a setuid root binary, it is possible for a remote attacker to obtain root, or superuser, privileges on a compromised system.

traffic_manager -path `perl -e 'print "A"x1720'` <