How to Buy
This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.
The remote RTSP server suffers from a buffer overflow vulnerability.
The remote host is running Helix DNA Server or Helix Server, a media
The version of the Helix server installed on the remote host contains
a heap overflow involving an invalid 'LoadTestPassword' field. An
unauthenticated, remote attacker can leverage this flaw using a simple
'DESCRIBE' request to crash the affected application and possibly to
execute arbitrary code subject to the privileges of the user id under
which it runs, which by default on Windows is LOCAL SYSTEM.
See also :
Upgrade to Helix Server / Helix DNA Server version 11.1.3 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.0
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 24876 (helix_loadtestpassword_overflow.nasl)
Bugtraq ID: 2114123068
CVE ID: CVE-2006-6026
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.