Xitami Web Server Administration Port Remote Overflow

critical Nessus Plugin ID 10322

Synopsis

The remote web server has a remote buffer overflow vulnerability.

Description

The remote host is running a vulnerable version of the Xitami web server. An attacker could exploit this by sending a lot of data to TCP port 81. This could lead to the execution of arbitrary code in the context of the web server, or create a denial of service.

Solution

Upgrade to the latest version of the software.

See Also

http://www.nessus.org/u?5ca7bf65

Plugin Details

Severity: Critical

ID: 10322

File Name: xitami_overflow.nasl

Version: 1.30

Type: remote

Family: Web Servers

Published: 10/30/1999

Updated: 8/7/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Reference Information

BID: 6599