Vulnerabilities > CVE-2005-0478 - Remote vulnerability in TrackerCam
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | TrackerCam PHP Argument Buffer Overflow. CVE-2005-0478. Webapps exploit for windows platform |
id | EDB-ID:16811 |
last seen | 2016-02-02 |
modified | 2010-05-09 |
published | 2010-05-09 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16811/ |
title | TrackerCam PHP Argument Buffer Overflow |
Metasploit
description | This module exploits a simple stack buffer overflow in the TrackerCam web server. All current versions of this software are vulnerable to a large number of security issues. This module abuses the directory traversal flaw to gain information about the system and then uses the PHP overflow to execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/HTTP/TRACKERCAM_PHPARG_OVERFLOW |
last seen | 2019-12-31 |
modified | 2017-08-14 |
published | 2005-12-26 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/trackercam_phparg_overflow.rb |
title | TrackerCam PHP Argument Buffer Overflow |
Nessus
NASL family | CGI abuses |
NASL id | TRACKERCAM_MULTIPLE_VULNERABILITIES.NASL |
description | The remote host is running TrackerCam, a HTTP software that allows a user to publish a webcam feed thru a website. The remote version of this software is affected by multiple vulnerabilities : - Buffer overflows which may allow an attacker to execute arbitrary code on the remote host. - A directory traversal bug that may allow an attacker to read arbitrary files on the remote host with the privileges of the web server daemon. - A cross-site scripting issue that may allow an attacker to use the remote host to perform a cross-site scripting attack. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17160 |
published | 2005-02-21 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17160 |
title | TrackerCam Multiple Remote Vulnerabilities |
Packetstorm
data source https://packetstormsecurity.com/files/download/82949/trackercam_phparg_overflow.rb.txt id PACKETSTORM:82949 last seen 2016-12-05 published 2009-11-26 reporter H D Moore source https://packetstormsecurity.com/files/82949/TrackerCam-PHP-Argument-Buffer-Overflow.html title TrackerCam PHP Argument Buffer Overflow data source https://packetstormsecurity.com/files/download/36461/trackercam_phparg_overflow.pm id PACKETSTORM:36461 last seen 2016-12-05 published 2005-03-05 reporter H D Moore source https://packetstormsecurity.com/files/36461/trackercam_phparg_overflow.pm.html title trackercam_phparg_overflow.pm