| VID |
21706 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WhatsUp Gold Web server has the '_maincfgret.cgi' CGI file being installed. Ipswitch WhatsUp Gold is a network management and monitoring tool for Microsoft Windows platforms. WhatsUp Gold version 8.03 and earlier versions are vulnerable to a remote buffer overflow vulnerability in the _maincfgret.cgi. By posting a specially-crafted long string for the instancename parameter of the _maincfgret.cgi, a remote attacker could execute arbitrary code on the affected computer with the privileges of the user that started the vulnerable application.
* Note: This check solely checks the existence of the '_maincfgret.cgi' CGI file to assess this vulnerability, so this might be a false positive.
* References: http://www.idefense.com/application/poi/display?id=142&type=vulnerabilities http://www.packetstormsecurity.org/0408-advisories/08.25.04.txt
* Platforms Affected: Ipswitch, WhatsUp Gold version 8.03 and earlier versions Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of WhatsUp Gold (8.03 Hotfix 1 or later), available from the WhatsUp Gold Web site at http://www.whatsupgold.com/ |
| Related URL |
CVE-2004-0798 (CVE) |
| Related URL |
11043 (SecurityFocus) |
| Related URL |
17111 (ISS) |
|