Description
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
1.25
Credits
Luigi Auriemma
References
raw.githubusercontent.com/...ows/http/rabidhamster_r4_log.rb
www.exploit-db.com/exploits/18929
aluigi.altervista.org/adv/r4_1-adv.txt
advisories.checkpoint.com/...public/2013/cpai-07-jan405.html
www.rabidhamster.org/R4/download.php
www.vulncheck.com/...bidhamster-r4-log-entry-buffer-overflow