7.5
CVSSv2

CVE-2011-2900

Published: 05/08/2011 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_dir.c in Simple HTTPD (shttpd) 1.42 allows remote malicious users to execute arbitrary code via an HTTP PUT request, as exploited in the wild in 2011.

Vulnerable Product Search on Vulmon Subscribe to Product

valenok mongoose 3.0

yassl yasslews 0.2

shttpd shttpd 1.42

Exploits

Simple HTTPd version 142 PUT request remote buffer overflow exploit ...
#!/usr/bin/python # Exploit Title: Simple HTTPd 142 PoC DoS # Date: 8/10/2011 # Author: G13 # Software Link: sourceforgenet/projects/shttpd/files/shttpd/142/shttpd-142targz/download # Version: 142 # Tested on: WinXP SP1 # CVE : 2011-2900 # # Since Mongoose HTTPd and Simple HTTPd share similar code, the exploit still works # Simple ...
#!/usr/bin/env python # part of femtocell research by TU-Berlin # only for educational purposes # Exploit Title: remote root on sfr/ubiquisys femtocell webserver (wsal/shttpd/mongoose) # Date: 2011-08-02 # Author: nion # Software: codegooglecom/p/mongoose/ sourceforgenet/projects/shttpd/ # Version: shttpd <= 142, mongoose <= ...