| VID |
22240 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The thttpd HTTP server, according to its banner, has a buffer overflow vulnerability via a long If-Modified-Since header. thttpd, developed by Acme Labs, is free Web server daemon available for most Unix-based operating systems. thttpd versions 1.90a through 2.04 are vulnerable to a buffer overflow in the date parsing function, tdate_parse(). By sending a long If-Modified-Since header, a remote attacker can overflow the buffer and execute arbitrary commands on the affected Web server or crash the server.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/1999-q3/1626.html
* Platforms Affected: thttpd 1.90a to 2.04 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of thttpd (2.05 or later), available from the thttpd Web site at http://www.acme.com/software/thttpd/
For SuSE Linux: Upgrade to the latest version of thttpd (2.04-31 or later), as listed in SuSE Security Announcement #30 at http://www.suse.de/de/security/suse_security_announce_30.txt
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-1999-1457,CVE-2000-0359 (CVE) |
| Related URL |
1248 (SecurityFocus) |
| Related URL |
4852 (ISS) |
|