ID CVE-2001-0820
Summary Buffer overflows in GazTek ghttpd 1.4 allows a remote attacker to execute arbitrary code via long arguments that are passed to (1) the Log function in util.c, or (2) serveconnection in protocol.c.
References
Vulnerable Configurations
  • cpe:2.3:a:gaztek:ghttp:1.4
    cpe:2.3:a:gaztek:ghttp:1.4
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
  • description ghttpd 1.4.x Log() Function Buffer Overflow Vulnerability. CVE-2001-0820. Remote exploit for linux platform
    id EDB-ID:21937
    last seen 2016-02-02
    modified 2002-10-07
    published 2002-10-07
    reporter flea
    source https://www.exploit-db.com/download/21937/
    title ghttpd 1.4.x Log Function Buffer Overflow Vulnerability
  • description ghttpd 1.4 Daemon Buffer Overflow Vulnerability. CVE-2001-0820,CVE-2002-1904. Remote exploit for linux platform
    id EDB-ID:20929
    last seen 2016-02-02
    modified 2001-06-17
    published 2001-06-17
    reporter qitest1
    source https://www.exploit-db.com/download/20929/
    title ghttpd 1.4 Daemon Buffer Overflow Vulnerability
nessus via4
NASL family Web Servers
NASL id WWW_TOO_LONG_URL.NASL
description The remote web server crashes when it receives a too long URL. It might be possible to make it execute arbitrary code through this flaw.
last seen 2019-01-16
modified 2018-08-07
plugin id 10320
published 1999-06-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10320
title Web Server Long URL Handling Remote Overflow DoS
refmap via4
bid
  • 2879
  • 2965
bugtraq
  • 20010617 Buffer Overflow in GazTek HTTP Daemon v1.4 (ghttpd)
  • 20010630 Advisory Ghttp 1.4
xf gaztek-ghttpd-bo(6702)
Last major update 17-10-2016 - 22:12
Published 06-12-2001 - 00:00
Last modified 18-12-2017 - 21:29
Back to Top