Acme mini_httpd Protocol String Handling Memory Disclosure

medium Nessus Plugin ID 90925

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The Acme mini_httpd web server running on the remote host is affected by a flaw in the add_headers() function within file mini_httpd.c that is triggered when handling HTTP requests that have a very long protocol string. An unauthenticated, remote attacker can exploit this, via a crafted request, to cause an out-of-bounds read error, resulting in the disclose of sensitive information in process memory.

Solution

If possible, upgrade to Acme mini_httpd version 1.23 or later. For vendor hardware, such as modems or industrial control devices, ensure that the firmware is current and/or its net access is limited to trusted networks only.

See Also

http://www.nessus.org/u?013a3d27

http://acme.com/software/mini_httpd/

Plugin Details

Severity: Medium

ID: 90925

File Name: minihttp_memory_leak.nasl

Version: 1.4

Type: remote

Family: Web Servers

Published: 5/5/2016

Updated: 11/19/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:acme:mini_httpd

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 12/28/2015

Vulnerability Publication Date: 1/23/2015

Reference Information

CVE: CVE-2015-1548

BID: 73450