Vulnerabilities > CVE-2005-2041 - Remote Security vulnerability in Hauri Virobot Linux Server 2.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Buffer overflow in addschup in HAURI ViRobot 2.0, and possibly other products, allows remote attackers to execute arbitrary code via a long ViRobot_ID cookie (HTTP_COOKIE).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | ViRobot Advanced Server 2.0 (addschup) Remote Cookie Exploit. CVE-2005-2041. Remote exploit for linux platform |
id | EDB-ID:1047 |
last seen | 2016-01-31 |
modified | 2005-06-14 |
published | 2005-06-14 |
reporter | Kevin Finisterre |
source | https://www.exploit-db.com/download/1047/ |
title | ViRobot Advanced Server 2.0 addschup Remote Cookie Exploit |
Nessus
NASL family | CGI abuses |
NASL id | VIROBOT_OVERFLOW.NASL |
description | The remote host is running ViRobot Linux Server, a commercial anti- virus product for Linux. According to its banner, the installed version of ViRobot Linux Server suffers from a remote buffer overflow vulnerability in its web-based management interface. By passing specially crafted data through the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18494 |
published | 2005-06-15 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18494 |
title | ViRobot Linux Server addschup Multiple Overflows |
code |
|
Saint
bid | 13964 |
description | ViRobot Server web interface addschup buffer overflow |
osvdb | 17320 |
title | virobot_addschup |
type | remote |
References
- http://marc.info/?l=full-disclosure&m=111880273631392&w=2
- http://secunia.com/advisories/15700
- http://www.digitalmunition.com/DMA%5B2005-0614a%5D.txt
- http://www.globalhauri.com/html/download/down_unixpatch.html
- http://www.osvdb.org/17320
- http://www.securiteam.com/exploits/5TP0C1FG1I.html
- http://www.securityfocus.com/bid/12964
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21000