Apache <= 1.3.33 htpasswd Local Overflow

medium Nessus Plugin ID 14771

Synopsis

The remote web server is affected by a buffer overflow vulnerability.

Description

The remote host appears to be running Apache 1.3.33 or older.

There is a local buffer overflow in the 'htpasswd' command in these versions that may allow a local user to gain elevated privileges if 'htpasswd' is run setuid or a remote user to run arbitrary commands remotely if the script is accessible through a CGI.

*** Note that Nessus solely relied on the version number *** of the remote server to issue this warning. This might *** be a false positive

Solution

Make sure htpasswd does not run setuid and is not accessible through any CGI scripts.

See Also

https://seclists.org/bugtraq/2004/Oct/356

https://seclists.org/fulldisclosure/2004/Sep/565

Plugin Details

Severity: Medium

ID: 14771

File Name: apache_htpasswd_overflow.nasl

Version: 1.25

Type: remote

Family: Web Servers

Published: 9/17/2004

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: Settings/ParanoidReport, installed_sw/Apache

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/16/2004

Reference Information

BID: 13777, 13778