source: http://www.securityfocus.com/bid/13066/info AN HTTPD is reported prone to a remote buffer overflow vulnerability. Specifically, the issue presents itself in 'cmdIS.DLL' which calls the 'GetEnvironmentStrings' function to copy environment variables into a finite sized process buffer. The attacker can issue a malformed HTTP GET command including excessive data as a value for an affected HTTP header to trigger the overflow. This can lead to arbitrary code execution, allowing the attacker to gain unauthorized access in the context of the Web server. AN HTTPD 1.42n is reported vulnerable, however, it is possible that other versions are affected as well. GET /scripts/cmdIS.dll/cgi-bin/test.bat HTTP/1.0 user-agent: aaaaaaaaaaaaaaaaaaaaaa [approx 8300 characters] aaaaaaaaaaaaaaaaaaaa...
Related ExploitsTrying to match CVEs (1): CVE-2005-1086
Trying to match OSVDBs (1): 15361
Other Possible E-DB Search Terms: AN HTTPD
|2002-10-21||AN HTTPD 1.38/1.39/1.40/1.41 - Malformed SOCKS4 Request Buffer Overflow||Kanatoko|
|2003-01-06||AN HTTPD 1.41 e - Cross-Site Scripting||D4rkGr3y|
|2005-04-08||AN HTTPD 1.42 - Arbitrary Log Content Injection||Tan Chew Keong|
|2003-04-22||AN HTTPD 1.x - Count.pl Directory Traversal||Matthew Murphy|