First published: Thu Mar 09 2006(Updated: )
Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acme Labs thttpd | =2.25b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1078 has a medium severity rating due to its potential to allow local users to gain elevated privileges.
To fix CVE-2006-1078, update to a patched version of htpasswd or restrict access to the htpasswd command.
CVE-2006-1078 affects users of Acme thttpd 2.25b and potentially other software that utilizes the htpasswd utility.
CVE-2006-1078 is classified as a buffer overflow vulnerability affecting command line arguments and input files.
No, CVE-2006-1078 requires local access for exploitation as it involves local users manipulating command line arguments.