📄 dwhttp_format_string.nasl
字号:
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added BugtraqID# This script could also cover BID:1556 and CVE-2000-0697## GPL# *untested*## References:## Date: Thu, 1 Aug 2002 16:31:40 -0600 (MDT) # From: "ghandi" <ghandi@mindless.com> # To: bugtraq@securityfocus.com # Subject: Sun AnswerBook2 format string and other vulnerabilities## Affected:# dwhttp/4.0.2a7a, dwhttpd/4.1a6# And others?if(description){ script_id(11075); script_bugtraq_id(5384); script_version ("$Revision: 38 $"); name["english"] = "dwhttpd format string"; script_name(english:name["english"]); desc["english"] = "The remote web server is vulnerable to a format string attack.A cracker may exploit this vulnerability to make your web servercrash continually or even execute arbirtray code on your system.Solution : upgrade your software or protect it with a filtering reverse proxyRisk factor : High"; script_description(english:desc["english"]); summary["english"] = "DynaWeb server vulnerable to format string"; script_summary(english:summary["english"]); script_category(ACT_MIXED_ATTACK); script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi"); family["english"] = "Gain root remotely"; family["francais"] = "Passer root
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -