VID |
210054 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Web server is running a version of XAMPP which is vulnerable to a buffer overflow vulnerability. XAMPP is an easy to install Apache distribution containing MySQL, PHP and Perl for Microsoft Windows platforms. XAMPP version 1.6.0 and earlier versions are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking by the mssql_connect function in the adodb.php script. By sending a specially-crafted request containing a long host parameter, a remote attacker could execute arbitrary code on the host or cause the affected application to crash.
* References: http://www.apachefriends.org/en/xampp-windows.html#1221 http://www.apachefriends.org/en/news-article,100366.html http://packetstorm.linuxsecurity.com/0704-exploits/xampp-rgod.txt http://www.milw0rm.com/exploits/3738
* Platforms Affected: Apache Friends, XAMPP version 1.6.0 and earlier versions Microsoft Windows Any version |
Recommendation |
No upgrade or patch available as of May 2007.
Upgrade to the latest version of XAMPP, when new fixed version becomes available from the SourceForge.net Web site at http://sourceforge.net/projects/xampp/
As a workaround, use XAMPP's Security Console to restrict access to the '/xampp' directory. |
Related URL |
CVE-2007-2079 (CVE) |
Related URL |
23491 (SecurityFocus) |
Related URL |
33683 (ISS) |
|