Vulnerabilities > CVE-1999-0970 - Denial of Service vulnerability in OmniHTTPD visiadmin.exe

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
omnicron
nessus
exploit available

Summary

The OmniHTTPD visadmin.exe program allows a remote attacker to conduct a denial of service via a malformed URL which causes a large number of temporary files to be created.

Vulnerable Configurations

Part Description Count
Application
Omnicron
1

Exploit-Db

descriptionOmnicron OmniHTTPD 1.1/2.0 Alpha 1 visiadmin.exe Denial of Service Vulnerability. CVE-1999-0970. Dos exploit for windows platform
idEDB-ID:20304
last seen2016-02-02
modified1999-06-05
published1999-06-05
reporterValentin Perelogin
sourcehttps://www.exploit-db.com/download/20304/
titleOmnicron OmniHTTPD 1.1/2.0 Alpha 1 visiadmin.exe Denial of Service Vulnerability

Nessus

NASL familyCGI abuses
NASL idVISADMIN.NASL
descriptionIt is possible to fill the hard disk of a server running OmniHTTPd by issuing the request : http://omni.server/cgi-bin/visadmin.exe?user=guest This allows an attacker to crash your web server. This script checks for the presence of the faulty CGI, but does not execute it.
last seen2020-06-01
modified2020-06-02
plugin id10295
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10295
titleOmniHTTPd visadmin.exe Malformed URL DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10295);
 script_version("1.35");
 script_cvs_date("Date: 2018/08/06 14:03:14");

 script_cve_id("CVE-1999-0970");
 script_bugtraq_id(1808);

 script_name(english:"OmniHTTPd visadmin.exe Malformed URL DoS");
 script_summary(english:"Checks for the visadmin.exe cgi");

 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a denial of
service vulnerability.");
 script_set_attribute(attribute:"description", value:
"It is possible to fill the hard disk of a server running OmniHTTPd by
issuing the request :

 http://omni.server/cgi-bin/visadmin.exe?user=guest

This allows an attacker to crash your web server. This script checks
for the presence of the faulty CGI, but does not execute it.");
 script_set_attribute(attribute:"solution", value:"Remove visadmin.exe from /cgi-bin.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/06/05");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");

 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);


port = get_http_port(default:80);
banner = get_http_banner(port:port);
if ( ! banner || "OmniHTTP" >!< banner ) exit(0);

foreach dir (cgi_dirs())
{
  res = http_send_recv3(method:"GET", item:string(dir,"/visadmin.exe"), port:port);
  if(isnull(res)) exit(1,"Null response to visadmin.exe request");

  if(res[0] =~ "^HTTP/1\.[0-9.] +200 +") security_warning(port);
}