EvoCam 3.6.6 / 3.6.7 Web Server GET Request Overflow

high Nessus Plugin ID 47682

Language:

Synopsis

The remote host has an application that may be susceptible to a remote buffer overflow attack.

Description

The version of EvoCam installed on the Mac OS X host is either 3.6.6 or 3.6.7. Such versions reportedly contain a buffer overflow in the Web Server component.

Using an overly long GET request, an unauthenticated remote attacker may be able to leverage this vulnerability to execute arbitrary code on the remote host subject to the privileges under which the application runs.

Solution

Upgrade to EvoCam 3.6.8 or later.

Plugin Details

Severity: High

ID: 47682

File Name: macosx_evocam_3_6_8.nasl

Version: 1.17

Type: local

Agent: macosx

Published: 7/8/2010

Updated: 7/24/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2010-2309

Vulnerability Information

Required KB Items: Host/MacOSX/packages, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/2/2010

Vulnerability Publication Date: 6/1/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (MacOS X EvoCam HTTP GET Buffer Overflow)

Reference Information

CVE: CVE-2010-2309

BID: 40489