Korean
<< Back
VID 21108
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The remote web server appears to be running O'Reilly WebSite and the '/cgi-shl/win-c-sample.exe' CGI is installed on the server.
The win-c-sample.exe program included with O'Reilly WebSite versions previous to 2.0 contains a buffer overflow that could allow a remote attacker to execute arbitrary commands on the server. The commands will be executed with the privileges of the user owning the server process.

* References:
http://www.iss.net/security_center/static/295.php
http://website.oreilly.com/
Recommendation Remove the sample program including '/cgi-shl/win-c-sample.exe' file from the CGI directories and upgrade to the latest version of WebSite.
Related URL CVE-1999-0178 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)