OmniHTTPD visiadmin.exe Denial of Service Vulnerability
BID:1808
Info
OmniHTTPD visiadmin.exe Denial of Service Vulnerability
| Bugtraq ID: | 1808 |
| Class: | Design Error |
| CVE: |
CVE-1999-0970 |
| Remote: | Yes |
| Local: | No |
| Published: | Jun 05 1999 12:00AM |
| Updated: | Jul 11 2009 03:56AM |
| Credit: | First posted to Bugtraq by Valentin Perelogin <[email protected]> on June 5, 1999. |
| Vulnerable: |
Omnicron OmniHTTPD 2.0 Alpha 1 Omnicron OmniHTTPD 1.1 |
| Not Vulnerable: |
Omnicron OmniHTTPD 2.0 Alpha 2 |
Discussion
OmniHTTPD visiadmin.exe Denial of Service Vulnerability
OmniHTTPD is a web-server offered by Omnicron for the MS Windows platform. One of the CGI utilities it ships with and installs by default contains a bug that could, if exploited, lead to a denial of service condition on host it runs on. When the "visiadmin.exe" program is executed via CGI with the argument "user=guest", it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk. The technical reasons for this behaviour are not known.
OmniHTTPD is a web-server offered by Omnicron for the MS Windows platform. One of the CGI utilities it ships with and installs by default contains a bug that could, if exploited, lead to a denial of service condition on host it runs on. When the "visiadmin.exe" program is executed via CGI with the argument "user=guest", it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk. The technical reasons for this behaviour are not known.
Exploit / POC
OmniHTTPD visiadmin.exe Denial of Service Vulnerability
http://omni.server/cgi-bin/visadmin.exe?user=guest
http://omni.server/cgi-bin/visadmin.exe?user=guest
Solution / Fix
OmniHTTPD visiadmin.exe Denial of Service Vulnerability
Solution:
It is believed (though uncomfirmed) that this problem was fixed in the 2.0 Alpha 2 release of Omnicron OmniHTTPD. To be safe it is suggested that the visiadmin.exe program be removed from the cgi-bin directory.
Solution:
It is believed (though uncomfirmed) that this problem was fixed in the 2.0 Alpha 2 release of Omnicron OmniHTTPD. To be safe it is suggested that the visiadmin.exe program be removed from the cgi-bin directory.
References
OmniHTTPD visiadmin.exe Denial of Service Vulnerability
References:
References:
- Omnicron Homepage (Omnicron Technologies Corporation)