header-logo
Suggest Exploit
vendor:
mod_ntlm Apache Module
by:
SecurityFocus
7.5
CVSS
HIGH
Heap Overflow
119
CWE
Product Name: mod_ntlm Apache Module
Affected Version From: mod_ntlm <= v0.4 for Apache 1.3 and mod_ntlmv2 version 0.1 for Apache 2.0
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

mod_ntlm Apache Module Heap Overflow Vulnerability

The mod_ntlm Apache module has been reported prone to a heap overflow vulnerability. The vulnerability occurs due to a lack of sufficient bounds checking performed on user-supplied data, stored in heap memory. By supplying excessive data an attacker may trigger a buffer overflow and corrupt crucial memory management structures. This may result in the execution of arbitrary code in the context of the Apache server.

Mitigation:

Ensure that mod_ntlm is not installed and configured on the Apache server. If it is, upgrade to the latest version.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7388/info

The mod_ntlm Apache module has been reported prone to a heap overflow vulnerability.

The vulnerability occurs due to a lack of sufficient bounds checking performed on user-supplied data, stored in heap memory. By supplying excessive data an attacker may trigger a buffer overflow and corrupt crucial memory management structures. This may result in the execution of arbitrary code in the context of the Apache server.

This vulnerability is reported to affect mod_ntlm <= v0.4 for Apache 1.3 and mod_ntlmv2 version 0.1 for Apache 2.0. 

GET / HTTP/1.0
Authorization: [Ax3000]