Vulnerabilities > CVE-2004-2271 - Remote Buffer Overflow vulnerability in MiniShare Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Minishare 1.4.1 Buffer Overflow. CVE-2004-2271. Remote exploit for windows platform id EDB-ID:16754 last seen 2016-02-02 modified 2010-05-09 published 2010-05-09 reporter metasploit source https://www.exploit-db.com/download/16754/ title Minishare 1.4.1 - Buffer Overflow description MiniShare Remote Buffer Overflow Exploit (c source). CVE-2004-2271. Remote exploit for windows platform id EDB-ID:636 last seen 2016-01-31 modified 2004-11-16 published 2004-11-16 reporter NoPh0BiA source https://www.exploit-db.com/download/636/ title MiniShare 1.4.1 - Remote Buffer Overflow Exploit description MiniShare. CVE-2004-2271. Remote exploit for windows platform id EDB-ID:616 last seen 2016-01-31 modified 2004-11-07 published 2004-11-07 reporter class101 source https://www.exploit-db.com/download/616/ title MiniShare <= 1.4.1 - Remote Buffer Overflow Exploit
Metasploit
description | This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack buffer overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable. |
id | MSF:EXPLOIT/WINDOWS/HTTP/MINISHARE_GET_OVERFLOW |
last seen | 2020-06-01 |
modified | 2017-07-24 |
published | 2005-12-26 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/minishare_get_overflow.rb |
title | Minishare 1.4.1 Buffer Overflow |
Nessus
NASL family | Web Servers |
NASL id | MINISHARE_OVERFLOW.NASL |
description | MiniShare 1.4.1 and prior versions are affected by a buffer overflow flaw. A remote attacker could execute arbitrary commands by sending a specially crafted file name in a the GET request. Version 1.3.4 and below do not seem to be vulnerable. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18424 |
published | 2005-06-06 |
reporter | This script is Copyright (C) 2005-2019 SensePost |
source | https://www.tenable.com/plugins/nessus/18424 |
title | MiniShare Webserver HTTP GET Request Remote Overflow |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/150689/minishare141-overflow.txt id PACKETSTORM:150689 last seen 2018-12-08 published 2018-12-07 reporter Rafael Pedrero source https://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html title MiniShare 1.4.1 HEAD / POST Buffer Overflow data source https://packetstormsecurity.com/files/download/82959/minishare_get_overflow.rb.txt id PACKETSTORM:82959 last seen 2016-12-05 published 2009-11-26 reporter acaro source https://packetstormsecurity.com/files/82959/Minishare-1.4.1-Buffer-Overflow.html title Minishare 1.4.1 Buffer Overflow
References
- http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0208.html
- http://secunia.com/advisories/13114
- http://securitytracker.com/id?1012106
- http://sourceforge.net/project/shownotes.php?release_id=241158
- http://www.osvdb.org/11530
- http://www.securiteam.com/exploits/6X00B1PBPC.html
- http://www.securityfocus.com/bid/11620
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17978