CVE-2012-10053 PUBLISHED

Simple Web Server Connection Header Buffer Overflow

Assigner: VulnCheck
Reserved: 08.08.2025 Published: 08.08.2025 Updated: 08.08.2025

Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor PMSoftware
Product Simple Web Server
Versions Default: unknown
  • Version 2.2 rc2 is affected

Credits

  • mr.pr0n finder

References

Problem Types

  • CWE-121 Stack-based Buffer Overflow CWE

Impacts

  • CAPEC-100 Overflow Buffers