Vulnerability: Sambar web server DoS

Recent versions of this modestly popular web server have been shown tobe vulnerable to a simple DoS through the sample cgi script testcgi.exe.

Sambar's developer recommends that users remove this sample applicationfrom any production servers. As a rule, vendor supplied samples of allsorts should be removed from all production machines (i.e. ones exposedto potentially hostile networks). Several other recent, minor securityissues with the Sambar server are also documented on the developer'ssecurity page.

More info at: http://www.sambar.com/security.htm

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CGI

Show Comments