mod_NTLM Overflow / Format String

high Nessus Network Monitor Plugin ID 1556

Synopsis

The remote host appears to be running a vulnerable version of mod_NTLM on top of Apache.

Description

The remote host appears to be running mod_NTLM on top of Apache. There is a bug in several versions of this module which make it vulnerable to a buffer overflow and a format string attack.

Solution

No solution known at this time.

See Also

http://archives.neohapsis.com/archives/bugtraq/2003-04/0251.html

http://www.nessus.org/u?9513a21e (vendor patch)

Plugin Details

Severity: High

ID: 1556

Family: Web Servers

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 11552

Reference Information

BID: 7393, 7388