header-logo
Suggest Exploit
vendor:
OmniHTTPD
by:
SecurityFocus
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: OmniHTTPD
Affected Version From: OmniHTTPD 1.0
Affected Version To: OmniHTTPD 1.0
Patch Exists: No
Related CWE: N/A
CPE: a:omnicron:omnihttpd:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: MS Windows
2002

OmniHTTPD Denial of Service Vulnerability

When the 'visiadmin.exe' program is executed via CGI with the argument 'user=guest', it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk.

Mitigation:

Disable the 'visiadmin.exe' program or restrict access to it.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1808/info

OmniHTTPD is a web-server offered by Omnicron for the MS Windows platform. One of the CGI utilities it ships with and installs by default contains a bug that could, if exploited, lead to a denial of service condition on host it runs on. When the "visiadmin.exe" program is executed via CGI with the argument "user=guest", it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk. The technical reasons for this behaviour are not known.

http://omni.server/cgi-bin/visadmin.exe?user=guest