ViRobot Linux Server filescan Authentication Bypass

Critical Nessus Network Monitor Plugin ID 3443


The remote web server is affected by an authentication bypass flaw.


The remote host is running ViRobot Linux Server, a commercial anti-virus application server. The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass authentication and gain access to its 'filescan' component by supplying a special cookie. An unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the remote host or disable access to the service by submitting scans of a large number of large files on the remote host.


Upgrade or patch according to vendor recommendations.

See Also

Plugin Details

Severity: Critical

ID: 3443

Family: Web Servers

Published: 2006/02/22

Modified: 2018/07/11

Dependencies: 1442

Nessus ID: 20968

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9.1


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hauri:virobot

Reference Information

CVE: CVE-2006-0864

BID: 16768