Summary
The host is running Ultra Mini HTTPD server and is prone to stack based buffer overflow vulnerability.
Impact
Successful exploitation will allow remote attackers to cause the application to crash, creating a denial-of-service condition.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to an error when processing certain long requests and can be exploited to cause a denial of service via a specially crafted packet.
Affected
Ultra Mini HTTPD server Version 1.21
Detection
Send a large crafted data via HTTP GET request and check the server is crashed or not.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Citrix Provisioning Services 'streamprocess.exe' Component Remote Code Execution Vulnerability
- Adobe Reader 'File Extension' Buffer Overflow Vulnerability (Mac OS X)
- Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Win)
- Apple Safari 'CSS' Buffer Overflow Vulnerability (Win) - Dec09
- Adobe Reader/Acrobat Multiple Vulnerabilities - Nov08 (Win)