[18576] in bugtraq

home help back first fref pref prev next nref lref last post

thttpd vulnerability NOT the original thttpd - secure web

daemon@ATHENA.MIT.EDU (Fred Cohen)
Fri Jan 12 13:17:44 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200101110511.VAA16545@all.net>
Date:         Wed, 10 Jan 2001 21:11:37 -0800
Reply-To: fc@all.net
From: Fred Cohen <fc@ALL.NET>
To: BUGTRAQ@SECURITYFOCUS.COM

thttpd - the trivial http daemon they are talking about here is NOT the
original thttpd that comes with deception toolkit.  This server was
proven secure years ago, and while it may reside on computers that are
vulnerable to denial of service attacks, the original thttpd has NO SUCH
VULNERABILITY!

This is the risk of modifying a reall secure server - assuming they
didn't just take the name as their own.  For the real thttpd, goto
all.net and load it with the rest of Deception Toolkit.

FC

> Advisory Name: Brickserver thttpd DoS and possible risk of buffer overflow
> Release Date: 01/09/2001
> Application: thttpd with modifications added by the vendor
> Platform: Brickserver Small Business Model
> Severity: Attackers can easily crash thttpd and possible find an
> exploitable buffer overflow
> Author(s): lockdown
>            banned-it
> Vendor Status: Sage inc. has been notifie

--
Fred Cohen at Sandia National Laboratories at tel:925-294-2087 fax:925-294-1225
  Fred Cohen & Associates: http://all.net - fc@all.net - tel/fax:925-454-0171
      Fred Cohen - Practitioner in Residence - The University of New Haven
   This communication is confidential to the parties it is intended to serve.
	PGP keys: https://all.net/pgpkeys.html - Have a great day!!!

home help back first fref pref prev next nref lref last post