| VID |
21171 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The ht://dig program in some Linux distributions could allow a remote attacker to retrieve arbitrary files, caused by a vulnerability in the htsearch CGI. The ht://dig program is freely available, open-source web search engine and indexing software. The vulnerability in the htsearch CGI could be used to (1) cause a denial of service (CPU consumption) by specifying a special file such as /dev/zero (2) read arbitrary files by uploading an alternate configuration file that specifies the target file.
This is due to the fact that it is possible to use command line arguments from the web interface. In particular, the -c [filename] argument is normally used to specify an alternate configuration file.
* Platforms Affected: ht://Dig 3.1.0b2 and more recent, including 3.1.5 and 3.2.0b3
* References: http://www.securityfocus.com/bid/3410 http://www.iss.net/security_center/static/7263.php |
| Recommendation |
Upgrade to prerelease versions of 3.1.6 or 3.2.0b4 or newer from the HT://Dig Web site, http://www.htdig.org/files/snapshots/
-- OR --
Download and install the appropriate patches or upgrades for your system, available from http://online.securityfocus.com/bid/3410/solution/ |
| Related URL |
CVE-2001-0834 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|