Family: Gain a shell remotely --> Category: destructive_attack
mod_ntlm overflow / format string bug Vulnerability Scan
Vulnerability Scan Summary
mod_ntlm overflow / format string
Detailed Explanation for this Vulnerability Test
The remote host seems to be running mod_ntlm, a NTLM authentication
module for Apache.
There is a buffer overflow as well as a format string issue in this server
which may be used by a possible hacker to execute arbitrary code on this host.
Solution : None at this time - disable NTLM authentication
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.