Korean
<< Back
VID 22242
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The thttpd HTTP server, according to its banner, has a buffer overflow vulnerability in the defang function. thttpd, developed by Acme Labs, is free Web server daemon available for most Unix-based operating systems. thttpd versions 2.21 through 2.23b1 are vulnerable to a buffer overflow in the defang function in the libhttpd.c file. A remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the affected system.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-10/0272.html

* Platforms Affected:
thttpd 2.21 through 2.23b1
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of thttpd (2.24 or later), available from the thttpd Web site at http://www.acme.com/software/thttpd/

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest thttpd package (2.21b-11.2 or later), as listed in Debian Security Advisory DSA-396-1 at http://www.debian.org/security/2003/dsa-396

For SuSE Linux:
Upgrade to the latest thttpd package, as listed in SuSE Security Announcement SuSE-SA:2003:044 at http://www.suse.com/de/security/2003_044_thttpd.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2003-0899 (CVE)
Related URL 8906 (SecurityFocus)
Related URL 13530 (ISS)