Apache 2.2.14 mod_isapi Dangling Pointer The Apache HTTP Server, commonly referred to as Apache, is a popular open source web server software. mod_isapi is a core module of the Apache package that implements the Internet Server extension API. The extension allows Apache to serve Internet Server extensions (ISAPI .dll modules) for Microsoft Windows based hosts. By sending a specially crafted request followed by a reset packet it is possible to trigger a vulnerability in Apache mod_isapi that will unload the target ISAPI module from memory. However function pointers still remain in memory and are called when published ISAPI functions are referenced. This results in a dangling pointer vulnerability. Successful exploitation results in the execution of arbitrary code with SYSTEM privileges. www.senseofsecurity.com.au www.senseofsecurity.com.au www.zdnet.com.au
Video Rating: 5 / 5
There are no revisions for this post.
Users who found this page were searching for:
- metasploit mod_isapi
- apache 2.2.14 mod_isapi
- apache 2.2.14 mod_isapi exploit "compiled"
- apache mod_isapi = 2.2.14 dangling pointer
- mod_isapi exploit use
- apache mod_isapi dangling pointer
- apache mod_isapi
- compile apache 2.2.14 mod_isapi dangling pointer
- metasploit mod_isapi dangling pointer
- check to see if sos.txt was created