HTTP: Apache mod_ntlm Authorization Buffer Overflow 1

This signature detects attempts to exploit a known vulnerablility against Apache Web server. An Apache Web server uses mod_ntlm (an Apache 1.x and 2.x module) to authenticate users against a Microsoft Windows Domain Controller. Attackers can send long or malformed strings to mod_ntlm using the Authorization HTTP header, overflow the buffer, then execute arbitrary code on the Web server.

Extended Description

The mod_ntlm Apache module has been reported prone to a heap overflow vulnerability. The vulnerability occurs due to a lack of sufficient bounds checking performed on user-supplied data, stored in heap memory. By supplying excessive data an attacker may trigger a buffer overflow and corrupt crucial memory management structures. This may result in the execution of arbitrary code in the context of the Apache server. This vulnerability is reported to affect mod_ntlm <= v0.4 for Apache 1.3 and mod_ntlmv2 version 0.1 for Apache 2.0.

Affected Products

Working_resources_inc. badblue_enterprise_edition

Short Name
HTTP:APACHE:MOD-NTLM-BOF1
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
1 Apache Authorization Buffer Overflow bid:7388 mod_ntlm
Release Date
03/25/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Mod_ntlm

Working_resources_inc.

Found a potential security threat?