Korean
<< Back
VID 21818
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of ELOG which is older or as old as than version 2.6.0-beta4 is detected as installed on the host. ELOG is a freely available open-source Web-based logbook program. ELOG version 2.6.0-beta4 and earlier versions could allow a remote attacker to cause a denial of service and possibly execute arbitrary code, caused by multiple buffer overflow flaws in the cmd and the mode parameters. A remote, unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code on the affected system with the permissions of the user running the affected application.

* Note: This check solely relied on the version number of ELOG Web Logbook installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040301.html
http://secunia.com/advisories/18124/
http://www.frsirt.com/english/advisories/2005/3000
http://securitytracker.com/id?1015379
http://marc.theaimsgroup.com/?l=full-disclosure&m=113498708213563&w=2

* Platforms Affected:
ELOG version 2.6.0-beta4 and earlier versions
Linux Any version
Unix Any version
Recommendation No upgrade or patch available as of January 2006.

Upgrade to the latest version of ELOG, when new version fixed this problem becomes available from the ELOG Download Web page at http://midas.psi.ch/elog/download.html
Related URL CVE-2005-4439 (CVE)
Related URL 15932 (SecurityFocus)
Related URL (ISS)