Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pmsoftware
Pmsoftware simple Web Server |
|
Vendors & Products |
Pmsoftware
Pmsoftware simple Web Server |
Fri, 08 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 08 Aug 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication. | |
Title | Simple Web Server Connection Header Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-08T18:12:53.677Z
Updated: 2025-08-08T18:48:37.339Z
Reserved: 2025-08-08T16:25:11.586Z
Link: CVE-2012-10053

Updated: 2025-08-08T18:48:25.433Z

Status : Awaiting Analysis
Published: 2025-08-08T19:15:35.637
Modified: 2025-08-08T20:30:18.180
Link: CVE-2012-10053

No data.