Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
CPE | Name | Operator | Version |
---|---|---|---|
grabit | le | 1.7.2 | |
grabit | eq | 1.7.2 beta2 | |
grabit | eq | 1.6.1 beta | |
grabit | eq | 1.5.3 beta | |
grabit | eq | 1.7.2 beta | |
grabit | eq | 1.5.1 beta | |
grabit | eq | 1.5.0 beta | |
grabit | eq | 1.6.2 beta | |
grabit | eq | 1.5.2 beta | |
grabit | eq | 1.7.1 beta |
blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
osvdb.org/54205
secunia.com/advisories/34893
www.securityfocus.com/archive/1/503184/100/0/threaded
www.securityfocus.com/bid/34807
www.securitytracker.com/id?1022161
www.shemes.com/index.php?p=whatsnew
www.vupen.com/english/advisories/2009/1243
exchange.xforce.ibmcloud.com/vulnerabilities/50310
www.exploit-db.com/exploits/8612