发布时间 :1998-08-23 00:00:00
修订时间 :2008-09-10 15:01:54

[原文]Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTTP request, which is improperly logged.

[CNNVD]Solaris ab2 (DynaWeb) Server DoS &潜在木马漏洞(CNNVD-199808-014)

        AnswerBook2 (AB2)网络服务器dwhttpd 3.1a4版本中存在格式字符串漏洞。远程攻击者通过编码HTTP请求中的%字符,导致服务拒绝以及可能执行任意命令,该过程被不正当地记录。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  19980823 Solaris ab2 web server is junk

- 漏洞信息

Solaris ab2 (DynaWeb) Server DoS &潜在木马漏洞
高危 格式化字符串
1998-08-23 00:00:00 2005-10-20 00:00:00
        AnswerBook2 (AB2)网络服务器dwhttpd 3.1a4版本中存在格式字符串漏洞。远程攻击者通过编码HTTP请求中的%字符,导致服务拒绝以及可能执行任意命令,该过程被不正当地记录。

- 公告与补丁

        AB2 technology is a third-party product from INSO who provides 'dwhttpd' as part of their DynaWeb toolkit. DynaWeb is an implementation of dynamic hypertext, where there are no preexisting web pages. Instead, the pages that you see are constructed on the fly by searching for the most relevant documents based on the links that you select.
        This bug is apparently fixed in Solaris 2.7. It is unknown if INSO updated the DynaWeb package for external release.

- 漏洞信息

Sun AnswerBook2 Web Server dwhttpd HTTP GET Request Format String DoS
Remote / Network Access, Local / Remote, Context Dependent Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability Upgrade
Vendor Verified

- 漏洞描述

Sun AnswerBook2 contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious user sends a HTTP GET request containing an enconded % character, and will result in loss of availability for the service.

- 时间线

1998-08-23 Unknow
1998-08-23 1998-11-01

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Sun Microsystems, Inc. has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者