mod_ntlm for Apache Multiple Remote Vulnerabilities

high Nessus Plugin ID 11552

Language:

Synopsis

The remote web server module has multiple vulnerabilities.

Description

The remote host seems to be running mod_ntlm, a NTLM authentication module for Apache. This version of mod_ntlm has a buffer overflow and a format string vulnerability. A remote attacker could exploit these issues to execute arbitrary code.

Solution

Apply the vendor patch.

See Also

https://seclists.org/bugtraq/2003/Apr/255

http://www.nessus.org/u?9513a21e

Plugin Details

Severity: High

ID: 11552

File Name: mod_ntlm.nasl

Version: 1.24

Type: remote

Family: Web Servers

Published: 4/26/2003

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, www/apache

Exploit Ease: No known exploits are available

Reference Information

BID: 7388, 7393