Korean
<< Back
VID 22240
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The thttpd HTTP server, according to its banner, has a buffer overflow vulnerability via a long If-Modified-Since header. thttpd, developed by Acme Labs, is free Web server daemon available for most Unix-based operating systems. thttpd versions 1.90a through 2.04 are vulnerable to a buffer overflow in the date parsing function, tdate_parse(). By sending a long If-Modified-Since header, a remote attacker can overflow the buffer and execute arbitrary commands on the affected Web server or crash the server.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/1999-q3/1626.html

* Platforms Affected:
thttpd 1.90a to 2.04
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of thttpd (2.05 or later), available from the thttpd Web site at http://www.acme.com/software/thttpd/

For SuSE Linux:
Upgrade to the latest version of thttpd (2.04-31 or later), as listed in SuSE Security Announcement #30 at http://www.suse.de/de/security/suse_security_announce_30.txt

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-1999-1457,CVE-2000-0359 (CVE)
Related URL 1248 (SecurityFocus)
Related URL 4852 (ISS)