OmniHTTPd visadmin.exe Malformed URL DoS

medium Nessus Plugin ID 10295

Synopsis

The remote host has an application that is affected by a denial of service vulnerability.

Description

It is possible to fill the hard disk of a server running OmniHTTPd by issuing the request :

http://omni.server/cgi-bin/visadmin.exe?user=guest

This allows an attacker to crash your web server. This script checks for the presence of the faulty CGI, but does not execute it.

Solution

Remove visadmin.exe from /cgi-bin.

Plugin Details

Severity: Medium

ID: 10295

File Name: visadmin.nasl

Version: 1.36

Type: remote

Family: CGI abuses

Published: 6/22/1999

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/5/1999

Reference Information

CVE: CVE-1999-0970

BID: 1808