COMMAND

    PDGSoft Shopping Cart

SYSTEMS AFFECTED

    UNIX/NT Web servers with PDGSoft's Cart.

PROBLEM

    Following  is  based  on  Cerberus  Information Security Advisory.
    The Cerberus Security Team has discovered two buffer overflows  in
    two  of  the  executables  that  come with PDGSoft's Shopping Cart
    These overruns  can be  exploited to  execute arbitrary  code by a
    remote attacker.

    The two executables with the vulnerabilities are redirect.exe  and
    changepw.exe  both  of  which  are  accessible  over  the web.  If
    supplied  an  overly  long  query  string  both  will  overflow an
    internal buffer overwriting the saved return address.

SOLUTION

    The vendor has made available a patch for every affected platform.
    See

        http://www.pdgsoft.com/Security/security2.html