Vulnerability Description
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Related Weaknesses (CWE)
References
- http://aluigi.altervista.org/adv/r4_1-adv.txt
- https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/18929
- https://www.rabidhamster.org/R4/download.php
- https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
FAQ
What is CVE-2012-10058?
CVE-2012-10058 is a documented vulnerability. RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a spe...
How severe is CVE-2012-10058?
CVSS scoring is not yet available for CVE-2012-10058. Check NVD for updates.
Is there a patch for CVE-2012-10058?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.