Rapid7 Vulnerability & Exploit Database

CESA-2004:191: cadaver security update

Back to Search

CESA-2004:191: cadaver security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
07/07/2004
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

An updated cadaver package is now available that fixes a vulnerability in neon which could be exploitable by a malicious DAV server.

cadaver is a command-line WebDAV client that uses inbuilt code from neon, an HTTP and WebDAV client library. Stefan Esser discovered a flaw in the neon library which allows a heap buffer overflow in a date parsing routine. An attacker could create a malicious WebDAV server in such a way as to allow arbitrary code execution on the client should a user connect to it using cadaver. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0398 to this issue. Users of cadaver are advised to upgrade to this updated package, which contains a patch correcting this issue. This issue does not affect CentOS Linux 3.

Solution(s)

  • centos-upgrade-cadaver

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;