| VID |
21817 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
A version of ELOG Web Logbook which is older than version 2.5.7 is detected as installed on the host. ELOG is a freely available open-source Web-based logbook program. ELOG version 2.5.6 and earlier versions are vulnerable to a heap-based buffer overflow vulnerability and an information disclosure vulnerability. A remote attacker could exploit these vulnerabilities to execute arbitrary code on the affected system, and also to bypass authentication and download a configuration file that contains a sensitive write password.
* Note: This check solely relied on the version number of ELOG Web Logbook installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.securiteam.com/exploits/5OP0B0UEUG.html http://secunia.com/advisories/14268/
* Platforms Affected: ELOG version 2.5.6 and earlier versions Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of ELOG (2.5.7 or later), available from the ELOG Download Web page at http://midas.psi.ch/elog/download.html |
| Related URL |
CVE-2005-0439,CVE-2005-0440 (CVE) |
| Related URL |
12556,12639,12640 (SecurityFocus) |
| Related URL |
19313,19323 (ISS) |
|