|Title:||Kolibri Webserver 'HEAD' Request Processing Buffer Overflow Vulnerability|
|Summary:||Determine Kolibri Webserver buffer overflow vulnerability|
Overview: This host is running Kolibri Webserver and is prone to buffer
This flaw is caused by a buffer overflow error when handling overly long
'HEAD' requests, which could allow remote unauthenticated attackers to
compromise a vulnerable web server via a specially crafted request.
Successful exploitation will allow attacker to crash the server process,
resulting in a denial-of-service condition.
Impact Level: Application
Kolibri Webserver version 2.0
Fix: No solution or patch is available as of 30th December, 2010. Information
regarding this issue will be updated once the solution details are available.
For updates refer to http://www.senkas.com/kolibri/download.php
BugTraq ID: 45579|
|Copyright||Copyright (C) 2010 SecPod|
|This is only one of 40605 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.