We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2012-10053

Simple Web Server Connection Header Buffer Overflow



Description

Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.

Reserved 2025-08-08 | Published 2025-08-08 | Updated 2025-08-08 | Assigner VulnCheck


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

2.2 rc2
affected

Credits

mr.pr0n finder

References

raw.githubusercontent.com/...dows/http/sws_connection_bof.rb exploit

www.exploit-db.com/exploits/19937 exploit

www.exploit-db.com/exploits/20028 exploit

ghostinthelab.wordpress.com/...mote-buffer-overflow-exploit/ technical-description exploit

www.pmx.it/software/sws.asp product

www.vulncheck.com/...erver-connection-header-buffer-overflow third-party-advisory

cve.org (CVE-2012-10053)

nvd.nist.gov (CVE-2012-10053)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2012-10053

Support options

Helpdesk Chat, Email, Knowledgebase