Plugin ID | 268 |
Plugin name | Cherokee prior 0.4.17.1 auth_pam format string |
Plugin filename | Cherokee prior 0.4.17.1 auth_pam format string.plugin |
Plugin filesize | 3463 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/11/04 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *Server:*Cherokee/0.[0-3].* OR HTTP/#.# ### *Server:*Cherokee/0.4.[0-9].* OR HTTP/#.# ### *Server:*Cherokee/0.4.1[1-7].* |
Plugin detection accuracy | 75 |
Plugin comment | Check is inspired by the Nessus plugin. It may be not as accurate as possible because the minor version can not be detected via the application banner. |
Bug published name | Florian Schilhabel |
Bug published email | security at gentoo dot org |
Bug published web | http://security.gentoo.org |
Bug published company | Gentoo Linux Security Audit Team |
Bug published date | 2004/11/01 |
Bug advisory | http://www.securityfocus.com/advisories/7424 |
Bug affected | Cherokee prior 0.4.17.1 |
Bug not affected | Cherokee 0.4.17.1 and newer or other web servers |
Bug vulnerability class | Format String |
Bug description | The remote host is using Cherokee, a fast and tiny web server. The remote version of this software is vulnerable to a format stringattack when processing authentication requests using auth_pam. |
Bug solution | Upgrade to Cherokee 0.4.17.1 or newer [ftp://alobbs.com/cherokee/0.4/]. Also limit unwanted connections and communications with firewalling if possible. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11574/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 6 |
Bug simplicity | 7 |
Bug impact | 8 |
Bug risk | 7 |
Bug Nessus risk | High |
Bug check tools | Nessus is able to do the same check. |
Source SecurityFocus BID | 11574 |
Source Nessus ID | 15617 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.alobbs.com/modules.php?op=modload&name=cherokee&file=index |