Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> BadBlue MFCISAPICommand Remote Buffer Overflow Vulnerability


Vulnerability Assessment Details

BadBlue MFCISAPICommand Remote Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Detects MFCISAPICommand remote buffer overflow vulnerability in BadBlue

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is prone to buffer overflow attacks.

Description :

The remote host is running a version of BadBlue http server that has a
buffer overflow vulnerability in 'Ext.Dll', a module that handles http
requests. An unauthenticated remote attacker can leverage this
vulnerability by sending an HTTP request containing a
'mfcisapicommand' parameter with more than 250 chars to kill the web
server and possibly execute code remotely with Administrator rights.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0599.html

Solution :

Upgrade to BadBlue 2.60.0 or later.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 12673

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Lenovo ThinkPad L420 Intel Core i5 5th Gen. 2.50GHz 4GB 320GB 14in. Laptop
$239.99
Lenovo ThinkPad L420 Intel Core i5 5th Gen. 2.50GHz 4GB 320GB 14in. Laptop pictureLenovo T410 Intel Core i5 5th Gen. 2.53GHz 4GB 320GB 14.1in. Laptop Windows 10
$219.99
Lenovo T410 Intel Core i5 5th Gen. 2.53GHz 4GB 320GB 14.1in. Laptop Windows 10 pictureMSFT Window Server 2008 R2 Standard Edition 64 bit x64 1-4CPU plus 10 CAL USERS
$79.99
MSFT Window Server 2008 R2 Standard Edition 64 bit x64 1-4CPU plus 10 CAL USERS pictureIBM Netvista N2200 8363 Thin Client 233MHz CPU / 32MB RAM / 16 MB CF
$27.0
IBM Netvista N2200 8363 Thin Client 233MHz CPU / 32MB RAM / 16 MB CF picture


Discussions

No Discussions have been posted on this vulnerability.