mod_NTLM Overflow / Format String

High Nessus Network Monitor Plugin ID 1556

Synopsis

The remote host appears to be running a vulnerable version of mod_NTLM on top of Apache.

Description

The remote host appears to be running mod_NTLM on top of Apache. There is a bug in several versions of this module which make it vulnerable to a buffer overflow and a format string attack.

Solution

No solution known at this time.

See Also

http://archives.neohapsis.com/archives/bugtraq/2003-04/0251.html

http://www.nessus.org/u?9513a21e (vendor patch)

Plugin Details

Severity: High

ID: 1556

File Name: 1556.prm

Family: Web Servers

Published: 2004/08/18

Modified: 2016/01/21

Dependencies: 3057

Nessus ID: 11552

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

CVSSv3

Base Score: 7.3

Temporal Score: 6.7

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:U/RC:X

Reference Information

BID: 7393, 7388

OSVDB: 55813, 55814