Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2663 |
Message | WEB-CGI WhatsUpGold instancename overflow attempt |
Summary | This event is generated when an attempt is made to exploit a vulnerability associated with the web server of WhatsUp Gold. |
Impact | A successful attack can cause a denial of service or a buffer overflow and the subsequent execution of arbitrary code on a vulnerable server. |
Detailed Information | WhatsUp Gold is a Windows application that can be used to monitor the status of a network and the availability and performance of servers. A vulnerability exists in the web server component of WhatsUp Gold that can cause a denial of service or buffer overflow and the subsequent execution of arbitrary code on a vulnerable server. This can occur when an overly long value is passed to the parameter "instancename" when invoking the _maincfgret CGI. It should be noted that the web server is not enabled by default in WhatsUp Gold. |
Affected Systems | WhatsUp Gold 8.x. |
Attack Scenarios | An attacker can connect to a web-enabled WhatsUp Gold server and send an overly long value to the "instancename" when calling _maincfgret, possibly causing a denial of service or buffer overflow. |
Ease of Attack | Denial of service - simple, buffer overflow - harder. |
Corrective Action | Upgrade to the latest non-affected version of the software. |
Additional References | |
Rule References | bugtraq: 11043 cve: 2004-0798 |
--
DID:446793
--
http://www.aanval.com/