Vulnerabilities > CVE-2006-5216 - Remote Buffer Overflow vulnerability in Sergey Lyubka Simple Httpd 1.34

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sergey-lyubka
exploit available
metasploit

Summary

Stack-based buffer overflow in Sergey Lyubka Simple HTTPD (shttpd) 1.34 allows remote attackers to execute arbitrary code via a long URI.

Vulnerable Configurations

Part Description Count
Application
Sergey_Lyubka
1

Exploit-Db

  • descriptionSHTTPD. CVE-2006-5216. Remote exploit for win32 platform
    idEDB-ID:16759
    last seen2016-02-02
    modified2010-05-09
    published2010-05-09
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16759/
    titleSHTTPD <= 1.34 URI-Encoded POST Request Overflow Win32
  • descriptionSHTTPD 1.34 (POST) Remote Buffer Overflow Exploit. CVE-2006-5216. Remote exploit for windows platform
    fileexploits/windows/remote/2482.pl
    idEDB-ID:2482
    last seen2016-01-31
    modified2006-10-05
    platformwindows
    port
    published2006-10-05
    reporterSkOd
    sourcehttps://www.exploit-db.com/download/2482/
    titleSHTTPD 1.34 POST Remote Buffer Overflow Exploit
    typeremote

Metasploit

descriptionThis module exploits a stack buffer overflow in SHTTPD <= 1.34. The vulnerability is caused due to a boundary error within the handling of POST requests. Based on an original exploit by skOd but using a different method found by hdm.
idMSF:EXPLOIT/WINDOWS/HTTP/SHTTPD_POST
last seen2020-02-29
modified2017-07-24
published2006-10-15
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/shttpd_post.rb
titleSHTTPD URI-Encoded POST Request Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83013/shttpd_post.rb.txt
idPACKETSTORM:83013
last seen2016-12-05
published2009-11-26
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/83013/SHTTPD-1.34-URI-Encoded-POST-Request-Overflow-win32.html
titleSHTTPD <= 1.34 URI-Encoded POST Request Overflow (win32)