| VID |
22322 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The RaidenHTTPD, according to its banner, has multiple remote vulnerabilities. RaidenHTTPD is a full featured web server for Microsoft Windows operating systems. RaidenHTTPD versions 1.1.33 and earlier are vulnerable to two vulnerabilities. The first vulnerability may be remotely exploited to obtain the source code of any PHP scripts on the server. The second is a buffer overflow vulnerability that may be remotely exploited to cause a denial of service or to execute arbitrary code on the vulnerable server.
* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://securityfocus.com/archive/1/391800 http://www.securiteam.com/windowsntfocus/5IP010KF5I.html
* Platforms Affected: RaidenHTTPD Team, RaidenHTTPD versions 1.1.33 and earlier Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of RaidenHTTPD (1.1.34 or later), available from the RaidenHTTPD Web page at http://www.raidenhttpd.com/en/index.html |
| Related URL |
CVE-2005-0622 (CVE) |
| Related URL |
12688 (SecurityFocus) |
| Related URL |
(ISS) |
|