S-172: Vulnerability in WebDAV Mini-Redirector


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-172: Vulnerability in WebDAV Mini-Redirector
# 1  
Old 02-12-2008
S-172: Vulnerability in WebDAV Mini-Redirector

A remote code execution vulnerability exists in the way that the WebDAV Mini-Redirector handles responses. The risk is HIGH. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Web Development

Sending file to WebDav Server

Hi All, I am using a webdav server host name : abc.xyz.com.ak username : user123 password : password123 port : 80 I need to send files stored in my windows system to the server, any idea how to do it. I dont know how to create a url in linux for webdav server using details. (2 Replies)
Discussion started by: prakhar_dubey
2 Replies

2. UNIX for Advanced & Expert Users

Write to file without redirector

Hello Shell scripting Gurus, I am writing a script to be executed from Oracle Scheduler. This script works flawlessly when executed at the shell prompt, but fails when executed from Oracle Scheduler due to the issues explained in the Oracle Link below: Guide to External Jobs on 10g with... (4 Replies)
Discussion started by: abby007
4 Replies

3. Shell Programming and Scripting

Webdav automation

Hi, I am required to automate file transfer to a Sharepoint Collection, I have failed in mounting the webdav as a file system using davfs2 so I am investigating Curl and Cadaver. Cadaver is probably the easiest solution, I can successfully connect and transfer files. However can anyone advise... (2 Replies)
Discussion started by: mcclunyboy
2 Replies

4. OS X (Apple)

Permissions trouble with WebDav

Hello! I need some advice about using WebDav in Mac OS 10.5 My problem is that I mount a WebDav folder in the hard drive pointing to a webdav directory service running under apache (it's Alfresco, if you know it) but the permissions of this directory, when mounted, are only for the user who... (0 Replies)
Discussion started by: osksp
0 Replies

5. Shell Programming and Scripting

shell script to change ip addess to 0.0.0.0 from 172.29.1.1 to 17.29.2.245

hello, i have a file in which lines like this are to ve replaced with lines like {172.29.1.55 mn55.mgmt.yuva.param # }should change to {0.0.0.0 mn55.mgmt.yuva.param #noconn Fallowing are the lines example lines are in a file in the same sequence to be converted : 172.29.1.49 ... (1 Reply)
Discussion started by: pankajd
1 Replies

6. Shell Programming and Scripting

upload file to webdav server

Hi all i have a such question this is my shell script my script must upload file to webdav server ////////////////////////////////////////////////////////////////////////////////////////////////////////////// #!/bin/sh ###... (1 Reply)
Discussion started by: knut
1 Replies

7. UNIX for Dummies Questions & Answers

Serial port redirector

I need make serial data from virtual serial ports available on a TCP/IP network. For communications with hardware COM ports to send and receive serial data over a local network or the Internet. Example: POSIX machine (/dev/ttyS0) <--- TCP/IP ---> Windows machine COM1 Please help! I try use... (0 Replies)
Discussion started by: steel98
0 Replies

8. Shell Programming and Scripting

Please help with Webdav transfer script

I need help on a script that syncs a directory with a webdav directory. For example I have the folders: ./upload/ ./upload/client ./upload/client/department ./upload/client2 ./upload/client2/department each of these folders contain docs that need to goto the webdav. also the client names... (1 Reply)
Discussion started by: brazen1445
1 Replies

9. UNIX for Advanced & Expert Users

UNIX Serial Port Redirector

Hi , I need to have an application where in I am able to create a virtual Serial port on a UNIX machine for a remote device which is accessible by a IP address and a port number (by terminal server). Both the machine and the remote device are on the same network. So after this application is... (1 Reply)
Discussion started by: naveenkj
1 Replies
Login or Register to Ask a Question
RATS(1) 						      General Commands Manual							   RATS(1)

NAME
rats - Rough Auditing Tool for Security SYNOPSIS
rats [options] [file]... DESCRIPTION
rats is a rough auditing tool for security developed by Secure Software, Inc. It is a tool for scanning C, Perl, PHP, and Python source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race condi- tions. As its name implies, the tool performs only a rough analysis of source code. It will not find every error and will also find things that are not errors. Manual inspection of your code is still necessary, but greatly aided with this tool. When started, RATS will scan each file or each file in the directory specified on the command line and produce a report when scanning is complete. What vulnerabilities are reported in the final report depend on the data contained in the vulnerability database or databases that are used and the warning level in use. For each vulnerability, the list of files and line numbers where it occured is given, followed by a brief description of the vulnerability and suggested action. OPTIONS
-h, --help Displays a brief usage summary and exit. -a <fun> Report any occurence of function 'fun' in the source file(s) -d <filename>, --database <filename>, --db <filename> Specifies a vulnerability database to be loaded. You may have multiple -d options and each database specified will be loaded. -i, --input Causes a list of function calls that were used which accept external input to be produced at the end of the vulnerability report. -l <lang>, --language <language> Force the specified language to be used regardless of filename extension. Currently valid language names are "c", "perl", "php" and "python". -r, --references Causes references to vulnerable function calls that are not being used as calls themselves to be reported. -w <level>, --warning <level> Sets the warning level. Valid levels are 1, 2 or 3. 1 includes only default and high severity. 2 includes medium severity (default). 3 includes low severity vulnerabilities. -x Causes the default vulnerability databases (which are in the installation data directory, /usr/share/rats by default) to not be loaded. -R, --no-recurssion Do not recurse subdirectories when encountered. --xml Output in XML --html Output in HTML --follow-symlinks Follow symlinks and treat them like whatever they are pointing to. If the symlink points to a directory it will be descended into unless -R is specified, if a pointing to a file, it will be treated as a file. AUTHOR
This manual page was orginally written by Adam Lazur <adam@lazur.org>, for the Debian GNU/Linux system (but may be used by others). Modified by Secure Software, Inc. September 17, 2001 RATS(1)