SCAN: Nessus Count.cgi Access

This signature detects access to the count.cgi CGI script. This script contains multiple well-known security vulnerabilities, including one that lets attackers send over-long queries to the program that can cause a buffer overflow and allow arbitrary code execution. This attack is included in the Nessus penetration testing program.

Extended Description

Wwwcount (count.cgi) is a very popular CGI program used to track website usage. In particular, it enumerates the number of hits on given webpages and increments them on a 'counter'. In October of 1997 two remotely exploitable problems were discovered with this program. The first problem was somewhat innocuous in that it only allowed remote users to view .GIF files they were not supposed to have access to. This may be dangerous if the site contains sensitive data in .GIF files such as demographic/financial data in charts etc. The second and most serious problem is a buffer overflow in QUERY_STRING enviroment variable handled by the program. In essence a remote user can send an overloy long query to the program and overflow a buffer in order to execute their own commands as whatever privelage level the program is running as.

Affected Products

Muhammad_a._muquit wwwcount

References

BugTraq: 128

CVE: CVE-1999-0021

Short Name
SCAN:NESSUS:COUNT-CGI
Severity
Info
Recommended
False
Recommended Action
None
Category
SCAN
Keywords
Access CVE-1999-0021 Count.cgi Nessus bid:128
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Rarely
Vendors

Muhammad_a._muquit

CVSS Score

7.5

Found a potential security threat?