mod_NTLM Overflow / Format String

high Nessus Network Monitor Plugin ID 1556

Synopsis

The remote host appears to be running a vulnerable version of mod_NTLM on top of Apache.

Description

The remote host appears to be running mod_NTLM on top of Apache. There is a bug in several versions of this module which make it vulnerable to a buffer overflow and a format string attack.

Solution

No solution known at this time.

See Also

http://archives.neohapsis.com/archives/bugtraq/2003-04/0251.html

http://www.nessus.org/u?9513a21e (vendor patch)

Plugin Details

Severity: High

ID: 1556

Family: Web Servers

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 11552

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Reference Information

BID: 7393, 7388