NCSA WebServer Buffer Overflow

HIGH (10.0) No Patch (11260 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 3.30% chance of exploitation (percentile: 87%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

The NCSA WebServer is a web server software that was widely used in the 1990s. It's now considered outdated and no longer supported by its original creators. The vulnerability allows an attacker to execute arbitrary code on your server by sending a malicious HTTP request.

Am I affected?

You're affected if you use NCSA WebServer version 1.4.1 or below. Check with: find / -name "ncsa*.html" (Note: This command may not find all instances, as the vulnerability can be triggered by other files as well.)

This is a specific web server software and should be checked with your IT department if you use this product.

Affected Products

NCSA / NCSA WebServer

How to fix

Upgrade to NCSA WebServer version 2.0 or later.
- Alternatively, apply the patch from the NCSA website: https://www.ncsa.gov/symptoms/ncsa-webserver-vulnerability