CERN httpd CGI Name Handling Remote Overflow

High Nessus Plugin ID 17231


The remote web server may be affected by a buffer overflow vulnerability.


The remote web server stopped responding after sending it a GET request for a CGI script with a arbitrary long file name. This is known to trigger a heap overflow in some servers like CERN HTTPD. An attacker may use this flaw to disrupt the remote service and possibly even run malicious code on the affected host subject to the privileges under which the service operates.


Contact the vendor for a patch or move to another server.

Plugin Details

Severity: High

ID: 17231

File Name: cern_httpd_cginame_overflow.nasl

Version: $Revision: 1.21 $

Type: remote

Family: Web Servers

Published: 2005/02/28

Modified: 2017/03/21

Dependencies: 10107, 17975

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Reference Information

OSVDB: 58152