CVE-2004-0389
CVSS7.8
发布时间 :2004-06-01 00:00:00
修订时间 :2011-03-07 21:15:48
NMCOEPS    

[原文]RealNetworks Helix Universal Server 9.0.1 and 9.0.2 allows remote attackers to cause a denial of service (crash) via malformed requests that trigger a null dereference, as demonstrated using (1) GET_PARAMETER or (2) DESCRIBE requests.


[CNNVD]Real Networks Helix Universal Server远程拒绝服务漏洞(CNNVD-200406-023)

        
        Helix Universal Server是一款由RealNetWorks开发和维护的多类型媒体服务器。
        Helix Universal Server不正确处理畸形RTSP请求,远程攻击者可以利用这个漏洞对服务器进行拒绝服务攻击。
        问题是Helix Universal Server不正确处理特殊构建的GET请求,下面的请求可导致NULL指针废弃而引起应用程序崩溃:
        $ echo -e "GET_PARAMETER / RTSP/1.0\n\n" | nc -v localhost 554
        $ echo -e "DESCRIBE / RTSP/1.0\nSession:\n\n" | nc -v localhost 554
        如果服务器以特殊选项如'--no-crash-avoidance'或'--no-auto-restart'启动,服务器就会变的不可访问。
        

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:realnetworks:helix_universal_server:9.0.2
cpe:/a:realnetworks:helix_universal_server:9.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0389
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0389
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200406-023
(官方数据源) CNNVD

- 其它链接及资源

http://www.idefense.com/application/poi/display?id=102&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20040415 RealNetworks Helix Universal Server Denial of Service Vulnerability
http://xforce.iss.net/xforce/xfdb/15880
(UNKNOWN)  XF  helix-get-dos(15880)
http://www.securityfocus.com/bid/10157
(UNKNOWN)  BID  10157
http://secunia.com/advisories/11395
(VENDOR_ADVISORY)  SECUNIA  11395

- 漏洞信息

Real Networks Helix Universal Server远程拒绝服务漏洞
高危 其他
2004-06-01 00:00:00 2006-01-05 00:00:00
远程  
        
        Helix Universal Server是一款由RealNetWorks开发和维护的多类型媒体服务器。
        Helix Universal Server不正确处理畸形RTSP请求,远程攻击者可以利用这个漏洞对服务器进行拒绝服务攻击。
        问题是Helix Universal Server不正确处理特殊构建的GET请求,下面的请求可导致NULL指针废弃而引起应用程序崩溃:
        $ echo -e "GET_PARAMETER / RTSP/1.0\n\n" | nc -v localhost 554
        $ echo -e "DESCRIBE / RTSP/1.0\nSession:\n\n" | nc -v localhost 554
        如果服务器以特殊选项如'--no-crash-avoidance'或'--no-auto-restart'启动,服务器就会变的不可访问。
        

- 公告与补丁

        厂商补丁:
        Real Networks
        -------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.real.com

- 漏洞信息 (24010)

Real Networks Helix Universal Server 9.0.x Denial of Service Vulnerability (EDBID:24010)
windows dos
2004-04-15 Verified
0 Anonymous
N/A [点击下载]
source: http://www.securityfocus.com/bid/10157/info

It has been reported that Real Networks Helix Universal Server is affected by a remote denial of service vulnerability. This issue is due to a failure of the application to properly handle malformed RTSP (Real-Time Streaming Protocol) requests.

An attacker may leverage this issue to trigger a denial of service condition in the affected server.

$ echo -e "GET_PARAMETER / RTSP/1.0\n\n" | nc -v localhost 554
$ echo -e "DESCRIBE / RTSP/1.0\nSession:\n\n" | nc -v localhost 554		

- 漏洞信息 (F33100)

iDEFENSE Security Advisory 2004-04-15.t (PacketStormID:F33100)
2004-04-22 00:00:00
iDefense Labs  idefense.com
advisory,remote,denial of service
CVE-2004-0389
[点击下载]

iDEFENSE Security Advisory 04.15.04: Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Universal Server could allow an attacker to restart and potentially disable the server.

RealNetworks Helix Universal Server Denial of Service Vulnerability

iDEFENSE Security Advisory 04.15.04
http://www.idefense.com/application/poi/display?type=vulnerabilities
February 15, 2004

I. BACKGROUND

RealNetworks Helix Universal Server is a universal digital media
delivery platform with industry leading performance, integrated content
distribution and Web services support. More information is available at
http://www.realnetworks.com.

II. DESCRIPTION

Remote exploitation of a denial of service (DoS) vulnerability in
RealNetworks, Inc.'s Helix Universal Server could allow an attacker to
restart and potentially disable the server.

The problem specifically exists in the handling of specially crafted GET
requests. The following sample requests will cause a null pointer
dereference, thereby causing the application to crash.

$ echo -e "GET_PARAMETER / RTSP/1.0\n\n" | nc -v localhost 554
$ echo -e "DESCRIBE / RTSP/1.0\nSession:\n\n" | nc -v localhost 554

If the server was started with specific options such as
'--no-crash-avoidance' or '--no-auto-restart', which is not the case in
the default installation, then the server will become inaccessible upon
receipt of the malicious requests.

III. ANALYSIS

Any unauthenticated remote attacker can exploit this vulnerability to
crash an affected server, thereby preventing legitimate usage.

Exploit code for this issue does not exist but is not necessary as the
issue is trivially exploited.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in versions
9.0.2 for Linux and version 9.0.1 for Windows.

V. WORKAROUND

Ensure that the server options '--no-crash-avoidance' and
'--no-auto-restart' are not enabled.

VI. VENDOR RESPONSE

"Both issues have been secured in the 9.03 release of the server."

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2004-0389 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

December 8, 2003    Exploit acquired by iDEFENSE
January 24, 2004    iDEFENSE clients notified
January 26, 2004    Initial vendor notification
April 15, 2004      Public disclosure

IX. CREDIT

Anonymous submission

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.



    

- 漏洞信息

5399
RealNetworks Helix Universal Server HTTP GET Request DoS
Denial of Service
Loss of Availability

- 漏洞描述

- 时间线

2004-04-16 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Real Networks Helix Universal Server Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 10157
Yes No
2004-04-15 12:00:00 2009-07-12 04:06:00
The individual responsible for the discovery of this issue is currently unknown.

- 受影响的程序版本

Real Networks Helix Universal Server 9.0.4 .958
Real Networks Helix Universal Server 9.0.2 .881
Real Networks Helix Universal Server 9.0.2 .802
Real Networks Helix Universal Server 9.0.2 .794
Real Networks Helix Universal Server 9.0 1
Real Networks Helix Universal Mobile Server 10.3.1 .716
Real Networks Helix Universal Mobile Server 10.1.1 .120
Real Networks Helix Universal Mobile Gateway 10.3.1 .716
Real Networks Helix Universal Mobile Gateway 10.1.1 .120

- 漏洞讨论

It has been reported that Real Networks Helix Universal Server is affected by a remote denial of service vulnerability. This issue is due to a failure of the application to properly handle malformed RTSP (Real-Time Streaming Protocol) requests.

An attacker may leverage this issue to trigger a denial of service condition in the affected server.

- 漏洞利用

No exploit is required to leverage this issue. The following proof of concept has been provided:

$ echo -e "GET_PARAMETER / RTSP/1.0\n\n" | nc -v localhost 554
$ echo -e "DESCRIBE / RTSP/1.0\nSession:\n\n" | nc -v localhost 554

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站