header-logo
Suggest Exploit
vendor:
mod_ntlm
by:
SecurityFocus
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: mod_ntlm
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Format String Vulnerability in mod_ntlm Apache Module

A format string vulnerability has been reported for the mod_ntlm Apache module. The problem occurs when logging authentication strings passed in HTTP requests. By passing malicious format specifiers in a request, it may be possibile for an attacker to corrupt sensitive locations in memory. This may result in a denial of service or under certain circumstances could allow an attacker to execute arbitrary code.

Mitigation:

Ensure that all user-supplied input is properly validated and sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7393/info

A format string vulnerability has been reported for the mod_ntlm Apache module. The problem occurs when logging authentication strings passed in HTTP requests. By passing malicious format specifiers in a request, it may be possibile for an attacker to corrupt sensitive locations in memory. This may result in a denial of service or under certain circumstances could allow an attacker to execute arbitrary code. 

GET / HTTP/1.0
Authorization: %n%n%n%n