CVE-2001-0949
CVSS7.5
发布时间 :2001-12-04 00:00:00
修订时间 :2016-10-17 22:13:49
NMCOS    

[原文]Buffer overflows in forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 allows remote attackers to execute arbitrary code via long arguments to the parameters (1) Mode, (2) Certificate_File, (3) useExpiredCRLs, (4) listenLength, (5) maxThread, (6) maxConnPerSite, (7) maxMsgLen, (8) exitTime, (9) blockTime, (10) nextUpdatePeriod, (11) buildLocal, (12) maxOCSPValidityPeriod, (13) extension, and (14) a particular combination of parameters associated with private key generation that form a string of a certain length.


[CNNVD]ValiCert Enterprise Validation Authority forms.exe maxConnPerSite 缓冲区溢出漏洞(CNNVD-200112-006)

        ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3到4.2.1的forms.exe CGI程序存在缓冲区溢出漏洞。远程攻击者借助参数(1) Mode, (2)Certificate_File,(3)useExpiredCRLs,(4)listenLength,(5)maxThread,(6)maxConnPerSite,(7)maxMsgLen,(8)exitTime, (9)blockTime,(10)nextUpdatePeriod,(11)buildLocal,(12)maxOCSPValidityPeriod, (13)extension,和(14)特殊的与形成某一长度的字符串的私人密钥产生有关系的参数组合中的超长参数执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:valicert:enterprise_validation_authority:3.7
cpe:/a:valicert:enterprise_validation_authority:3.8
cpe:/a:valicert:enterprise_validation_authority:3.3
cpe:/a:valicert:enterprise_validation_authority:4.2
cpe:/a:valicert:enterprise_validation_authority:3.6
cpe:/a:valicert:enterprise_validation_authority:3.9
cpe:/a:valicert:enterprise_validation_authority:3.4
cpe:/a:valicert:enterprise_validation_authority:4.2.1
cpe:/a:valicert:enterprise_validation_authority:4.1
cpe:/a:valicert:enterprise_validation_authority:3.5
cpe:/a:valicert:enterprise_validation_authority:4.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0949
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0949
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-006
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=100749428517090&w=2
(UNKNOWN)  BUGTRAQ  20011204 NMRC Advisory - Multiple Valicert Problems
http://www.securityfocus.com/bid/3621
(VENDOR_ADVISORY)  BID  3621
http://www.securityfocus.com/bid/3622
(UNKNOWN)  BID  3622
http://www.securityfocus.com/bid/3624
(UNKNOWN)  BID  3624
http://www.securityfocus.com/bid/3625
(UNKNOWN)  BID  3625
http://www.securityfocus.com/bid/3627
(UNKNOWN)  BID  3627
http://www.securityfocus.com/bid/3628
(UNKNOWN)  BID  3628
http://www.securityfocus.com/bid/3629
(UNKNOWN)  BID  3629
http://www.securityfocus.com/bid/3630
(UNKNOWN)  BID  3630
http://www.securityfocus.com/bid/3631
(UNKNOWN)  BID  3631
http://www.securityfocus.com/bid/3632
(UNKNOWN)  BID  3632
http://www.securityfocus.com/bid/3633
(UNKNOWN)  BID  3633
http://www.securityfocus.com/bid/3634
(UNKNOWN)  BID  3634
http://www.securityfocus.com/bid/3635
(UNKNOWN)  BID  3635
http://www.securityfocus.com/bid/3636
(UNKNOWN)  BID  3636
http://www.valicert.com/support/security_advisory_eva.html
(VENDOR_ADVISORY)  CONFIRM  http://www.valicert.com/support/security_advisory_eva.html
http://xforce.iss.net/static/7652.php
(VENDOR_ADVISORY)  XF  eva-forms-bo(7652)

- 漏洞信息

ValiCert Enterprise Validation Authority forms.exe maxConnPerSite 缓冲区溢出漏洞
高危 缓冲区溢出
2001-12-04 00:00:00 2005-10-20 00:00:00
远程  
        ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3到4.2.1的forms.exe CGI程序存在缓冲区溢出漏洞。远程攻击者借助参数(1) Mode, (2)Certificate_File,(3)useExpiredCRLs,(4)listenLength,(5)maxThread,(6)maxConnPerSite,(7)maxMsgLen,(8)exitTime, (9)blockTime,(10)nextUpdatePeriod,(11)buildLocal,(12)maxOCSPValidityPeriod, (13)extension,和(14)特殊的与形成某一长度的字符串的私人密钥产生有关系的参数组合中的超长参数执行任意代码。

- 公告与补丁

        An updated version 4.2.2 has been released which fixes this vulnerability. ValiCert encourages users to contact support@valicert.com for support information.

- 漏洞信息

13209
ValiCert Enterprise Validation Authority forms.exe exitTime Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

A remote overflow exists in Enterprise Validation Authority. The forms.exe program fails to validate the exitTime variable resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2001-12-04 Unknow
2001-12-04 Unknow

- 解决方案

Upgrade to version 4.2.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

ValiCert Enterprise Validation Authority forms.exe exitTime Buffer Overflow Vulnerability
Boundary Condition Error 3636
Yes No
2001-12-04 12:00:00 2009-07-11 09:06:00
Discovered and posted to Bugtraq by Information Anarchy 2K01 <advisories@nmrc.org>.

- 受影响的程序版本

Valicert Enterprise Validation Authority 4.2.1
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 4.2
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 4.1
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 4.0
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.9
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.8
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.7
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.6
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.5
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.4
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 3.3
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6
Valicert Enterprise Validation Authority 4.2.2
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6

- 不受影响的程序版本

Valicert Enterprise Validation Authority 4.2.2
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.8
- Sun Solaris 2.7
- Sun Solaris 2.6

- 漏洞讨论

ValiCert Enterprise Validation Authority includes an Administration Server, which can be accessed through a web interface. CGI functionality is provided by the script forms.exe. This script is available on port 13333 in the default installation.

One of the services provided configures how the server responds to validation requests. If an unusually long string is passed into this function as the 'exitTime' parameter, a string buffer will be overflowed. This could overwrite the stack, and possibly lead to execution of arbitrary code.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

An updated version 4.2.2 has been released which fixes this vulnerability. ValiCert encourages users to contact support@valicert.com for support information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站