Summary
The host is running Ultra Mini HTTPD server and is prone to stack based buffer overflow vulnerability.
Impact
Successful exploitation will allow remote attackers to cause the application to crash, creating a denial-of-service condition.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to an error when processing certain long requests and can be exploited to cause a denial of service via a specially crafted packet.
Affected
Ultra Mini HTTPD server Version 1.21
Detection
Send a large crafted data via HTTP GET request and check the server is crashed or not.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Cyrus IMAP Server 'split_wildmats()' Remote Buffer Overflow Vulnerability
- Attachmate Reflection FTP Client LIST Command Remote Heap Buffer Overflow Vulnerability
- Adobe Shockwave Player ActiveX Control BOF Vulnerability
- Apple QuickTime Multiple Buffer Overflow Vulnerabilities (Windows)
- BaoFeng Storm ActiveX Control Buffer Overflow Vulnerability