7.5
CVSSv2

CVE-2007-5067

Published: 24/09/2007 Updated: 29/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote malicious users to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.

Vulnerable Product Search on Vulmon Subscribe to Product

imatix xitami 2.5_c2

Exploits

## # $Id: xitami_if_mod_sincerb 10150 2010-08-25 20:55:37Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
#!/usr/bin/python # Xitami Web Server 25 (If-Modified-Since) 0day Remote Buffer Overflow Exploit # Bug discovered by Krystian Kloskowski (h07) <h07@interiapl> # Tested on: Xitami 25c2 / XP SP2 Polish # Shellcode: Windows Execute Command (calc) <metasploitcom> # Details: # # [Module xigui32exe] # If-Modified-Since: Evil, [ ...