Vulnerabilities > CVE-2005-0478 - Remote vulnerability in TrackerCam

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
trackercam
nessus
exploit available
metasploit

Summary

Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.

Vulnerable Configurations

Part Description Count
Application
Trackercam
1

Exploit-Db

descriptionTrackerCam PHP Argument Buffer Overflow. CVE-2005-0478. Webapps exploit for windows platform
idEDB-ID:16811
last seen2016-02-02
modified2010-05-09
published2010-05-09
reportermetasploit
sourcehttps://www.exploit-db.com/download/16811/
titleTrackerCam PHP Argument Buffer Overflow

Metasploit

descriptionThis module exploits a simple stack buffer overflow in the TrackerCam web server. All current versions of this software are vulnerable to a large number of security issues. This module abuses the directory traversal flaw to gain information about the system and then uses the PHP overflow to execute arbitrary code.
idMSF:EXPLOIT/WINDOWS/HTTP/TRACKERCAM_PHPARG_OVERFLOW
last seen2019-12-31
modified2017-08-14
published2005-12-26
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/trackercam_phparg_overflow.rb
titleTrackerCam PHP Argument Buffer Overflow

Nessus

NASL familyCGI abuses
NASL idTRACKERCAM_MULTIPLE_VULNERABILITIES.NASL
descriptionThe remote host is running TrackerCam, a HTTP software that allows a user to publish a webcam feed thru a website. The remote version of this software is affected by multiple vulnerabilities : - Buffer overflows which may allow an attacker to execute arbitrary code on the remote host. - A directory traversal bug that may allow an attacker to read arbitrary files on the remote host with the privileges of the web server daemon. - A cross-site scripting issue that may allow an attacker to use the remote host to perform a cross-site scripting attack.
last seen2020-06-01
modified2020-06-02
plugin id17160
published2005-02-21
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17160
titleTrackerCam Multiple Remote Vulnerabilities

Packetstorm