Korean
<< Back
VID 210054
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server is running a version of XAMPP which is vulnerable to a buffer overflow vulnerability. XAMPP is an easy to install Apache distribution containing MySQL, PHP and Perl for Microsoft Windows platforms. XAMPP version 1.6.0 and earlier versions are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking by the mssql_connect function in the adodb.php script. By sending a specially-crafted request containing a long host parameter, a remote attacker could execute arbitrary code on the host or cause the affected application to crash.

* References:
http://www.apachefriends.org/en/xampp-windows.html#1221
http://www.apachefriends.org/en/news-article,100366.html
http://packetstorm.linuxsecurity.com/0704-exploits/xampp-rgod.txt
http://www.milw0rm.com/exploits/3738

* Platforms Affected:
Apache Friends, XAMPP version 1.6.0 and earlier versions
Microsoft Windows Any version
Recommendation No upgrade or patch available as of May 2007.

Upgrade to the latest version of XAMPP, when new fixed version becomes available from the SourceForge.net Web site at http://sourceforge.net/projects/xampp/

As a workaround, use XAMPP's Security Console to restrict access to the '/xampp' directory.
Related URL CVE-2007-2079 (CVE)
Related URL 23491 (SecurityFocus)
Related URL 33683 (ISS)