CVE-2003-0562
CVSS5.0
发布时间 :2003-08-27 00:00:00
修订时间 :2016-10-17 22:35:25
NMCOEPS    

[原文]Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.


[CNNVD]Novell Netware Enterprise Web Server CGI2Perl.NLM缓冲区溢出漏洞(CNNVD-200308-113)

        Novell Netware 5.1版本和6.0版本的CGI2PERL.NLM PERL处理器存在缓冲区溢出漏洞。远程攻击者可以借助超长输入字符串导致服务拒绝(ABEND)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:novell:netware:5.1:sp6Novell NetWare 5.1 Service Pack 6
cpe:/o:novell:netware:6.0:sp1
cpe:/o:novell:netware:6.0:sp2
cpe:/o:novell:netware:5.1Novell NetWare 5.1
cpe:/o:novell:netware:5.1:sp4Novell NetWare 5.1 SP4
cpe:/o:novell:netware:6.0Novell NetWare 6.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0562
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0562
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-113
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0041.html
(UNKNOWN)  VULNWATCH  20030723 Buffer Overflow in Netware Web Server PERL Handler
http://marc.info/?l=bugtraq&m=105897561229347&w=2
(UNKNOWN)  BUGTRAQ  20030723 NOVL-2003-2966549 - Enterprise Web Server PERL Buffer Overflow
http://marc.info/?l=bugtraq&m=105897724931665&w=2
(UNKNOWN)  BUGTRAQ  20030723 Buffer Overflow in Netware Web Server PERL Handler
http://support.novell.com/servlet/tidfinder/2966549
(UNKNOWN)  CONFIRM  http://support.novell.com/servlet/tidfinder/2966549
http://www.kb.cert.org/vuls/id/185593
(UNKNOWN)  CERT-VN  VU#185593
http://www.protego.dk/advisories/200301.html
(UNKNOWN)  MISC  http://www.protego.dk/advisories/200301.html

- 漏洞信息

Novell Netware Enterprise Web Server CGI2Perl.NLM缓冲区溢出漏洞
中危 缓冲区溢出
2003-08-27 00:00:00 2005-10-20 00:00:00
远程  
        Novell Netware 5.1版本和6.0版本的CGI2PERL.NLM PERL处理器存在缓冲区溢出漏洞。远程攻击者可以借助超长输入字符串导致服务拒绝(ABEND)。

- 公告与补丁

        The vendor has released a fix to address this issue, customers who are affected by this vulnerability are advised to download and apply the patch. See referenced advisory for further details.
        Novell Netware 5.1 SP4
        
        Novell Netware 5.1 SP6
        
        Novell Netware 5.1
        

- 漏洞信息 (22949)

Novell Netware Enterprise Web Server 5.1/6.0 CGI2Perl.NLM Buffer Overflow Vulnerability (EDBID:22949)
netware dos
2003-07-23 Verified
0 Uffe Nielsen
N/A [点击下载]
source: http://www.securityfocus.com/bid/8251/info

Novell Netware Enterprise Web Server cgi2perl.nlm has been reported prone to a buffer overflow vulnerability.

The issue presents itself, likely due to insufficient bounds checking performed on user-supplied data. It has been reported that a remote attacker may send data in a manner sufficient to trigger the condition, and cause one or more server ABEND conditions.

http://www.example.com/perl/aaaaaa...[Unspecified number of characters]		

- 漏洞信息 (F31424)

netware.perl.txt (PacketStormID:F31424)
2003-07-23 00:00:00
Uffe Nielsen  protego.dk
advisory,web,denial of service,overflow,perl
CVE-2003-0562
[点击下载]

The Netware 5.1 SP6 suffers from a buffer overflow in the web server PERL handler CGI2PERL.NLM which will cause a denial of service situation. CERT: VU# 185593.

Topic: Buffer Overflow in Netware Web Server PERL Handler
Platform : Netware 5.1 SP6, Netware 6 under certain conditions.
Application : NetWare Enterprise Web Server
Advisory URL: http://www.protego.dk/advisories/200301.html
Identifiers: CERT: VU# 185593, CVE: CAN-2003-0562
Vendor Name: Novell, Inc. 
Vendor URL: http://www.novell.com
Vendor contacted: 10-Feb-2003
Public release: 23-Jul-2003

Problem:
The Netware Enterprise Server does not perform proper bounds check on
requests passed to the perl interpreter through the perl virtual
directory. This results in a buffer overflow condition, when large
requests are sent to the perl interpreter.

Details:
The issue can be triggered by requesting the perl virtual directory
followed by a long string.

http://server/perl/aaaaaa...[Unspecified number of characters]

The vulnerability occurs in the CGI2PERL.NLM module.

Impact:
A request like the above will overrun the allocated buffer and overwrite
EIP, causing the server to ABEND and either suspend the process or
restart itself, thereby creating a Denial of Service situation.

Corrective actions:
Novell has made a patch for this issue:
http://support.novell.com/servlet/tidfinder/2966549

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an "AS IS" condition.
There are NO warranties with regard to this information. In no event
shall PROTEGO be liable for any consequences or damages, including
direct, indirect, incidental, consequential, loss of business profits or
special damages, arising out of or in connection with the use or spread
of this information. Any use of this information lies within the user's
responsibility. All registered and unregistered trademarks represented
in this document are the sole property of their respective owners. 

    

- 漏洞信息

2310
Novell NetWare Web Server CGI2PERL.NLM PERL Handler Remote Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

A remote overflow exists in Netware Webserver. The Netware Webserver fails to limit the amount of data submitted to the perl interpreter through the perl virtual directory resulting in a buffer overflow. With a specially crafted request, an attacker can cause an overflow resulting in a loss of availability.

- 时间线

2003-07-23 Unknow
Unknow Unknow

- 解决方案

Upgrade to version Netware 6 SP3 or higher, as it has been reported to fix this vulnerability. In addition, Novell has released a patch for some older versions.

- 相关参考

- 漏洞作者

- 漏洞信息

Novell Netware Enterprise Web Server CGI2Perl.NLM Buffer Overflow Vulnerability
Boundary Condition Error 8251
Yes No
2003-07-23 12:00:00 2009-07-11 10:56:00
Discovery of this vulnerability has been credited to Uffe Nielsen.

- 受影响的程序版本

Novell Netware 6.0 SP2
Novell Netware 6.0 SP1
Novell Netware 6.0
Novell Netware 5.1 SP6
Novell Netware 5.1 SP4
Novell Netware 5.1

- 漏洞讨论

Novell Netware Enterprise Web Server cgi2perl.nlm has been reported prone to a buffer overflow vulnerability.

The issue presents itself, likely due to insufficient bounds checking performed on user-supplied data. It has been reported that a remote attacker may send data in a manner sufficient to trigger the condition, and cause one or more server ABEND conditions.

- 漏洞利用

The following proof of concept has been provided:

http://www.example.com/perl/aaaaaa...[Unspecified number of characters]

- 解决方案

The vendor has released a fix to address this issue, customers who are affected by this vulnerability are advised to download and apply the patch. See referenced advisory for further details.


Novell Netware 5.1 SP4

Novell Netware 5.1 SP6

Novell Netware 5.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站