COMMAND

    Xitami

SYSTEMS AFFECTED

    Xitami

PROBLEM

    Simon  Breathnach  found  following.   Anyone  can  remotely crash
    Xitami webserver by  sending simple GET  command.  On  remote side
    will be:

        Assertion Failed!
        Module: D:\Imatix\Develop\Smt\Smthttpl.c , line 745

    All you need to do is just telnet to remote computer and execute

        GET<space><enter><enter>

    command.  Also Xitami will crash if you'll execute

        POST<space><enter><enter>

    or

        HEAD<space><enter><enter> command.

    There is another  DoS in Xitami.   By default installation  Xitami
    allows anonymous users on ftp.   So connect to remote computer  as
    anonymous user and execute cd con/con command.

SOLUTION

    Xitami 2.4d7 and 2.5b3 were released fixing the DoS bugs  reported
    here and elsewhere.  The latest 2.5b3 beta also corrects a  number
    of big issues in the previous betas, and is being used heavily  on
    a  number  of  sites,  with  apparent  success.  The latest GSLgen
    (GSLgen/2.0) is provided  in the beta  package.  Your  old GSL/1.3
    scripts *won't* work without changes - the language has evolved...