Vulnerabilities > CVE-2006-1078 - Unspecified vulnerability in Acme Labs Thttpd 2.25B

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
acme-labs
nessus

Summary

Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.

Vulnerable Configurations

Part Description Count
Application
Acme_Labs
1

Nessus

NASL familyWeb Servers
NASL idACME_THTTPD_2_26.NASL
descriptionAccording to its banner, the version of Acme thttpd server running on the remote host is prior to 2.26. It is, therefore, affected by multiple vulnerabilities : - Multiple buffer overflow conditions exist in the htpasswd utility. A local attacker can exploit these, by calling htpasswd and supplying arbitrary commands along with a username to be added to the password file, to bypass required authentication and execute arbitrary programs with elevated privileges. (CVE-2006-1078) - A flaw exists in htpasswd that allows a local attacker to gain privileges via shell metacharacters in a command line argument, which can then be used to execute other commands. (CVE-2006-1079) - An unspecified flaw exists that allows a local attacker to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file. (CVE-2006-4248) Note that Nessus has not tested for these issues but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id97144
published2017-02-14
reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/97144
titleAcme thttpd < 2.26 Multiple Vulnerabilities