CVE-2007-4915
Boa 0.93.15 - Administrator Password Overwrite Authentication Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The Intersil isl3893 extensions for Boa 0.93.15, as used on the FreeLan RO80211G-AP and other devices, do not prevent stack writes from entering memory locations used for string constants, which allows remote attackers to change the admin password stored in memory via a long username in an HTTP Basic Authentication request.
Las extensiones Intersil isl3893 para Boa 0.93.15, utilizadas sobre FreeLan RO80211G-AP y otros dispositivos, no previenen la escritura en pila desde la entrada a localizaciones de memoria utilizadas para constantes de cadenas, las cuales permiten a atacantes remotos cambiar la contraseña de admin almacenada en memoria a través de un nombre de usuario largo en una respuesta HTTP Basic Authentication.
The Intersil extension in the Boa HTTP Server 0.93.x - 0.94.11 allows basic authentication bypass when the user string is greater than 127 bytes long. The long string causes the password to be overwritten in memory, which enables the attacker to reset the password. In addition, the malicious attempt also may cause a denial-of-service condition. Please note that you must set the request URI to the directory that requires basic authentication in order to work properly.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-09-14 First Exploit
- 2007-09-17 CVE Reserved
- 2007-09-17 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/3151 | Third Party Advisory | |
http://www.gnucitizen.org/projects/router-hacking-challenge | X_refsource_misc | |
http://www.ikkisoft.com/stuff/SN-2007-02.txt | X_refsource_misc | |
http://www.securenetwork.it/ricerca/advisory/download/SN-2007-02.txt | X_refsource_misc | |
http://www.securityfocus.com/archive/1/479434/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/489009/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/25676 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/30584 | 2007-09-14 | |
https://www.exploit-db.com/exploits/4542 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Boa Search vendor "Boa" | Boa Webserver Search vendor "Boa" for product "Boa Webserver" | 0.93.15 Search vendor "Boa" for product "Boa Webserver" and version "0.93.15" | - |
Affected
|