Executive Summary
Summary | |
---|---|
Title | New webfs packages fix buffer overflows, file and directory exposure |
Informations | |||
---|---|---|---|
Name | DSA-392 | First vendor Publication | 2003-09-29 |
Vendor | Debian | Last vendor Modification | 2003-09-29 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Jens Steube reported two vulnerabilities in webfs, a lightweight HTTP server for static content. CAN-2003-0832 - When virtual hosting is enabled, a remote client could specify ".." as the hostname in a request, allowing retrieval of directory listings or files above the document root. CAN-2003-0833 - A long pathname could overflow a buffer allocated on the stack, allowing execution of arbitrary code. In order to exploit this vulnerability, it would be necessary to be able to create directories on the server in a location which could be accessed by the web server. In conjunction with CAN-2003-0832, this could be a world-writable directory such as /var/tmp. For the current stable distribution (woody) these problems have been fixed in version 1.17.2. For the unstable distribution (sid) these problems have been fixed in version 1.20. We recommend that you update your webfs package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-392 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2009-06-23 | Name : www too long url File : nvt/www_too_long_url.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 392-1 (webfs) File : nvt/deb_392_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
3996 | webfs Directory Creation Pathname Handling Remote Overflow webfs contains a flaw that allows a remote attacker to execute arbitrary code. The issue is due to an overflow condition in "ls.c" that results in an unchecked buffer. If an attacker created a specially crafted request in conjunction with a directory traversal attack, they could potentially execute arbitrary code on the victim machine. |
2619 | webfs Arbitrary File and Directory Access webfs contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the software not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "hostname" variable(s). |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-392.nasl - Type : ACT_GATHER_INFO |
1999-06-22 | Name : The remote web server may be affected by a buffer overflow vulnerability. File : www_too_long_url.nasl - Type : ACT_DENIAL |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:55 |
|