OmniHTTPD visiadmin.exe Denial of Service Vulnerability

BID:1808

Info

OmniHTTPD visiadmin.exe Denial of Service Vulnerability

Bugtraq ID: 1808
Class: Design Error
CVE: CVE-1999-0970
Remote: Yes
Local: No
Published: Jun 05 1999 12:00AM
Updated: Jul 11 2009 03:56AM
Credit: First posted to Bugtraq by Valentin Perelogin <[email protected]> on June 5, 1999.
Vulnerable: Omnicron OmniHTTPD 2.0 Alpha 1
Omnicron OmniHTTPD 1.1
Not Vulnerable: Omnicron OmniHTTPD 2.0 Alpha 2

Discussion

OmniHTTPD visiadmin.exe Denial of Service Vulnerability

OmniHTTPD is a web-server offered by Omnicron for the MS Windows platform. One of the CGI utilities it ships with and installs by default contains a bug that could, if exploited, lead to a denial of service condition on host it runs on. When the "visiadmin.exe" program is executed via CGI with the argument "user=guest", it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk. The technical reasons for this behaviour are not known.

Exploit / POC

OmniHTTPD visiadmin.exe Denial of Service Vulnerability

http://omni.server/cgi-bin/visadmin.exe?user=guest

Solution / Fix

OmniHTTPD visiadmin.exe Denial of Service Vulnerability

Solution:
It is believed (though uncomfirmed) that this problem was fixed in the 2.0 Alpha 2 release of Omnicron OmniHTTPD. To be safe it is suggested that the visiadmin.exe program be removed from the cgi-bin directory.

References

OmniHTTPD visiadmin.exe Denial of Service Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report