CVE-2003-0400
CVSS5.0
发布时间 :2003-06-30 00:00:00
修订时间 :2016-10-17 22:33:27
NMCOES    

[原文]Vignette StoryServer and Vignette V/5 does not properly calculate the size of text variables, which causes Vignette to return unauthorized portions of memory, as demonstrated using the "-->" string in a CookieName argument to the login template, referred to as a "memory leak" in some reports.


[CNNVD]Vignette内存泄露漏洞(CNNVD-200306-124)

        Vignette StoryServer和Vignette V/5没有正确计算text变量的大小,该漏洞可能导致Vignette返回内存未认证的部分,正如在登录模板的CookieName参数中使用“-->”字符串,相当于某些报告中的“内存泄露”。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:vignette:vignette:5.0
cpe:/a:vignette:storyserver:4.1
cpe:/a:vignette:storyserver:5.0
cpe:/a:vignette:storyserver:4.0
cpe:/a:vignette:content_suite:6.0
cpe:/a:vignette:storyserver:4.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0400
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0400
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200306-124
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105405985126857&w=2
(UNKNOWN)  BUGTRAQ  20030526 S21SEC-018 - Vignette memory leak AIX Platform
http://www.iss.net/security_center/static/12075.php
(VENDOR_ADVISORY)  XF  vignette-memory-leak(12075)
http://www.s21sec.com/es/avisos/s21sec-018-en.txt
(VENDOR_ADVISORY)  MISC  http://www.s21sec.com/es/avisos/s21sec-018-en.txt
http://www.securityfocus.com/bid/7684
(VENDOR_ADVISORY)  BID  7684

- 漏洞信息

Vignette内存泄露漏洞
中危 其他
2003-06-30 00:00:00 2006-04-07 00:00:00
远程  
        Vignette StoryServer和Vignette V/5没有正确计算text变量的大小,该漏洞可能导致Vignette返回内存未认证的部分,正如在登录模板的CookieName参数中使用“-->”字符串,相当于某些报告中的“内存泄露”。

- 公告与补丁

        The vendor has posted a response to this issue at the following location:
        http://support.vignette.com/VOLSS/KB/View/1,,5557,00.html
        It should be noted that only existing Vignette customers and partners are able to access the above link.
        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (22472)

Vignette StoryServer 4.1 Sensitive Stack Memory Information Disclosure Vulnerability (EDBID:22472)
multiple remote
2003-04-07 Verified
0 @stake
N/A [点击下载]
source: http://www.securityfocus.com/bid/7296/info

It has been reported that Vignette StoryServer, under some circumstances may reveal stack memory content.

If a specially crafted request is made for a page that accepts user-supplied data an error state may be triggered. If the attack is successful a dump of the current stack contents will be returned to the attackers browser within an error message.

The information gathered in this way may be used to mount further attacks against the system.

https://www.example.com/securelogin/1,2345,A,00.html?Errmessage="x214>x214 		

- 漏洞信息 (22646)

Vignette 4.x/5.0 Memory Disclosure Vulnerability (EDBID:22646)
unix remote
2003-05-26 Verified
0 S21Sec
N/A [点击下载]
source: http://www.securityfocus.com/bid/7684/info

Vignette is prone to an issue which may expose the contents of memory to remote attackers. This condition is due to a flaw in how StoryServer calculates the size of certain characters in URI variables, which may cause data from adjacent memory to be returned to the remote attacker in the response.

This issue was reported for Vignette on IBM AIX. Other platforms may also be affected, though this has not been confirmed. The issue affects some of the default templates provided with Vignette.

http://www.example.com/vgn/login/1,501,,00.html?cookieName=x--\> 		

- 漏洞信息

4911
Vignette StoryServer Memory Leak Information Disclosure
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality
Exploit Public

- 漏洞描述

Vignette and StoryServer products contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a specific request is made to a dynamic page, which will crash the TCL interpreter and disclose memory available on the stack, resulting in a loss of confidentiality.

- 时间线

2003-04-07 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Vignette has released a patch to address this vulnerability. Costumers should contact Vignette technical support in order to obtain information on how to deal with this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Vignette Memory Disclosure Vulnerability
Failure to Handle Exceptional Conditions 7684
Yes No
2003-05-26 12:00:00 2009-07-11 10:06:00
Discovery of this issue is credited to S21SEC <vul-serv@s21sec.com>.

- 受影响的程序版本

Vignette Vignette V/5
Vignette V6 Content Suite
Vignette StoryServer 5.0
Vignette StoryServer 4.2
Vignette StoryServer 4.1
Vignette StoryServer 4.0
Vignette Content Suite V7
RedHat kernel-2.2.12-20.i686.rpm V6

- 漏洞讨论

Vignette is prone to an issue which may expose the contents of memory to remote attackers. This condition is due to a flaw in how StoryServer calculates the size of certain characters in URI variables, which may cause data from adjacent memory to be returned to the remote attacker in the response.

This issue was reported for Vignette on IBM AIX. Other platforms may also be affected, though this has not been confirmed. The issue affects some of the default templates provided with Vignette.

** The vendor has stated that this issue is the same issue reported in BID 7296. This BID will be subsequently retired.

- 漏洞利用

This issue may be exploited with a web browser. The following example was submitted:

http://www.example.com/vgn/login/1,501,,00.html?cookieName=x--\&gt;

- 解决方案

The vendor has posted a response to this issue at the following location:

http://support.vignette.com/VOLSS/KB/View/1,,5557,00.html

It should be noted that only existing Vignette customers and partners are able to access the above link.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站