Apache Traffic Server < 3.0.4 / 3.1.3 Host HTTP Header Parsing Remote Overflow

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote caching server is affected by a buffer overflow
vulnerability.

Description :

According to its banner, the version of Apache Traffic Server
installed on the remote host is earlier than 3.0.4 or 3.1.x earlier
than 3.1.3. It is, therefore, potentially affected by a heap-based
buffer overflow vulnerability when handling malicious HTTP host
headers. By exploiting this flaw, a remote, unauthenticated attacker
could execute arbitrary code on the remote host subject to the
privileges of the user running the affected service.

Note that Nessus did not actually test for these flaws, but instead
has relied on the version in the server's banner.

See also :

https://www.cert.fi/en/reports/2012/vulnerability612884.html
http://seclists.org/fulldisclosure/2012/Mar/260

Solution :

Upgrade to Apache Traffic Server 3.0.4 / 3.1.3 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 58593 ()

Bugtraq ID: 52696

CVE ID: CVE-2012-0256