CVE-2002-0450
CVSS10.0
发布时间 :2002-07-26 00:00:00
修订时间 :2008-09-10 15:12:16
NMCOS    

[原文]Buffer overflow in Talentsoft Web+ 5.0 and earlier allows remote attackers to execute arbitrary code via a long Web Markup Language (wml) file name to (1) webplus.dll or (2) webplus.exe.


[CNNVD]TalentSoft Web+ Web markup语言存在缓冲溢出漏洞(CNNVD-200207-110)

        
        TalentSoft Web+是一款开发基于WEB的客户端/服务器端应用程序的环境,运行在Microsoft windows 9x/NT/2000和Unix操作系统上。
        TalentSoft Web+的Web markup语言(.wml)存在远程缓冲区溢出漏洞,可以导致远程攻击者利用这个漏洞获得httpd权限的访问。
        由于对TalentSoft Web+对文件名的边界检查缺少正确检查,远程用户可以提交包含超长名的.wml文件给TalentSoft Web+服务程序,导致程序出现返回地址覆盖,以httpd的权限执行任意代码。
        发送任意数据给服务器程序,会导致对TalentSoft Web+崩溃。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:talentsoft:web%2B_server:4.6
cpe:/a:talentsoft:web%2B_server:5.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0450
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0450
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200207-110
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4282
(VENDOR_ADVISORY)  BID  4282
http://www.talentsoft.com/Issues/IssueDetail.wml?ID=WP943
(UNKNOWN)  CONFIRM  http://www.talentsoft.com/Issues/IssueDetail.wml?ID=WP943
http://www.iss.net/security_center/static/8446.php
(UNKNOWN)  XF  webplus-wml-bo(8446)
http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00208.html
(UNKNOWN)  BUGTRAQ  20020313 2nd Buffer Overflow in Talentsoft's Web+ (#NISR13032002)

- 漏洞信息

TalentSoft Web+ Web markup语言存在缓冲溢出漏洞
危急 边界条件错误
2002-07-26 00:00:00 2005-10-20 00:00:00
远程  
        
        TalentSoft Web+是一款开发基于WEB的客户端/服务器端应用程序的环境,运行在Microsoft windows 9x/NT/2000和Unix操作系统上。
        TalentSoft Web+的Web markup语言(.wml)存在远程缓冲区溢出漏洞,可以导致远程攻击者利用这个漏洞获得httpd权限的访问。
        由于对TalentSoft Web+对文件名的边界检查缺少正确检查,远程用户可以提交包含超长名的.wml文件给TalentSoft Web+服务程序,导致程序出现返回地址覆盖,以httpd的权限执行任意代码。
        发送任意数据给服务器程序,会导致对TalentSoft Web+崩溃。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用防火墙对TalentSoft Web+服务进行访问控制,不允许不可信用户访问。
        厂商补丁:
        TalentSoft
        ----------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        TalentSoft Web+ Server 4.6:
        TalentSoft Patch webplus_46_security_patch2
        ftp://ftp.talentsoft.com/download/webplus/windows/webplus_46_security_patch2.exe
        Windows
        TalentSoft Patch webplus_46_linux_dynamic_security_patch2
        ftp://ftp.talentsoft.com/download/webplus/unix/patches/webplus_46_linux_dynamic_security_patch2.tar.gz
        Linux (libc5)
        TalentSoft Patch webplus_46_solaris_sparc_security_patch2
        ftp://ftp.talentsoft.com/download/webplus/unix/patches/webplus_46_solaris_sparc_security_patch2.tar.gz
        Sun Solaris
        TalentSoft Web+ Server 5.0:
        TalentSoft Patch webplus_50_security_patch
        ftp://ftp.talentsoft.com/download/webplus/windows/webplus_50_security_patch.exe
        Windows
        TalentSoft Patch webplus_50_linux_dynamic_security_patch
        ftp://ftp.talentsoft.com/download/webplus/unix/patches/webplus_50_linux_dynamic_security_patch.tar.gz
        Linux (libc5)

- 漏洞信息

6784
talentsoft Web+ webplus.exe Long WML Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

A remote overflow exists in Web+. The 'webplus.exe' script fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request containing an overly long Web Markup Language (wml) file name, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2002-03-13 2002-03-06
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Webplus has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

TalentSoft Web+ Web Markup Language Buffer Overflow Vulnerability
Boundary Condition Error 4282
Yes No
2002-03-13 12:00:00 2009-07-11 11:56:00
Discovered by NGSSoftware Insight Security Research <nisr@nextgenss.com>.

- 受影响的程序版本

TalentSoft Web+ Server 5.0
- Linux libc 5x
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
TalentSoft Web+ Server 4.6
- FreeBSD FreeBSD 3.x
- FreeBSD FreeBSD 2.x
- Linux libc 5x
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 5.x
- RedHat Linux 4.x
- Sun Solaris x86
- Sun Solaris 8_sparc

- 漏洞讨论

TalentSoft Web+ is an environment for developing web-based client/server applications. It will run on Microsoft Windows 9x/NT/2000 and Unix operating systems.

An issue has been discovered in Web+ which could allow for users to execute arbitrary code with SYSTEM privileges.

Submitting a request for an unusually long .wml file could initiate a buffer overflow condition. This overflow could overwrite stack variables, including the return address, and be used to execute arbitrary code as the web server process. However, sending random data could cause the application to crash.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

TalentSoft has released a patch which addresses this issue:


TalentSoft Web+ Server 4.6

TalentSoft Web+ Server 5.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站