|Category:||Gain a shell remotely|
|Title:||mod_ntlm overflow / format string bug|
|Summary:||mod_ntlm overflow / format string|
The remote host seems to be running mod_ntlm, a NTLM authentication
module for Apache.
There is a buffer overflow as well as a format string issue in this server
which may be used by an attacker to execute arbitrary code on this host.
Solution : None at this time - disable NTLM authentication
Risk factor : High
BugTraq ID: 7388|
BugTraq ID: 7393
|Copyright||This script is Copyright (C) 2003 Renaud Deraison|
|This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.