Korean
<< Back
VID 22322
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The RaidenHTTPD, according to its banner, has multiple remote vulnerabilities. RaidenHTTPD is a full featured web server for Microsoft Windows operating systems. RaidenHTTPD versions 1.1.33 and earlier are vulnerable to two vulnerabilities. The first vulnerability may be remotely exploited to obtain the source code of any PHP scripts on the server. The second is a buffer overflow vulnerability that may be remotely exploited to cause a denial of service or to execute arbitrary code on the vulnerable server.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://securityfocus.com/archive/1/391800
http://www.securiteam.com/windowsntfocus/5IP010KF5I.html

* Platforms Affected:
RaidenHTTPD Team, RaidenHTTPD versions 1.1.33 and earlier
Microsoft Windows Any version
Recommendation Upgrade to the latest version of RaidenHTTPD (1.1.34 or later), available from the RaidenHTTPD Web page at http://www.raidenhttpd.com/en/index.html
Related URL CVE-2005-0622 (CVE)
Related URL 12688 (SecurityFocus)
Related URL (ISS)