Xitami 2.5c2 Web Server If-Modified-Since Overflow

2007-09-29T04:30:59
ID MSF:EXPLOIT/WINDOWS/HTTP/XITAMI_IF_MOD_SINCE
Type metasploit
Reporter Rapid7
Modified 2017-11-08T16:00:24

Description

This module exploits a stack buffer overflow in the iMatix Corporation Xitami Web Server. If a malicious user sends an If-Modified-Since header containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique.