Exploit Omnicron OmniHTTPd 1.1/2.0 Alpha 1 - 'visiadmin.exe' Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20304
Проверка EDB
  1. Пройдено
Автор
VALENTIN PERELOGIN
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-1999-0970
Дата публикации
1999-06-05
Код:
source: https://www.securityfocus.com/bid/1808/info

OmniHTTPD is a web-server offered by Omnicron for the MS Windows platform. One of the CGI utilities it ships with and installs by default contains a bug that could, if exploited, lead to a denial of service condition on host it runs on. When the "visiadmin.exe" program is executed via CGI with the argument "user=guest", it creates temporary files until the hard drive fills. The files then need to be manually removed before anything can be written to the disk. The technical reasons for this behaviour are not known.

http://omni.server/cgi-bin/visadmin.exe?user=guest
 
Источник
www.exploit-db.com

Похожие темы