CVE-2004-0774
CVSS7.8
发布时间 :2004-11-03 00:00:00
修订时间 :2008-09-05 16:39:21
NMCOPS    

[原文]RealNetworks Helix Universal Server 9.0.2 for Linux and 9.0.3 for Windows allows remote attackers to cause a denial of service (CPU and memory exhaustion) via a POST request with a Content-Length header set to -1.


[CNNVD]RealNetworks Helix Universal Server部分POST请求远程拒绝服务漏洞(CNNVD-200411-022)

        
        Helix Universal Server是一款由RealNetworks开发和维护的多类型媒体服务器。
        Helix Universal Server对部分POST请求字段数据缺少正确处理,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        远程攻击者只要发送特殊构建的带Content-Length头设置为'-1'的HTTP POST请求,可导致目标服务程序消耗大量内存和CPU资源,停止对正常服务的响应,产生拒绝服务。
        

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:realnetworks:helix_universal_server:9.0.2
cpe:/a:realnetworks:helix_universal_mobile_server_and_gateway:10.3.1.716
cpe:/a:realnetworks:helix_universal_server:9.0.4.958

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0774
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0774
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-022
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/17648
(PATCH)  XF  helix-post-dos(17648)
http://www.idefense.com/application/poi/display?id=151&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20041007 RealNetworks Helix Server Content-Length Denial of Service Vulnerability

- 漏洞信息

RealNetworks Helix Universal Server部分POST请求远程拒绝服务漏洞
高危 输入验证
2004-11-03 00:00:00 2006-01-05 00:00:00
远程  
        
        Helix Universal Server是一款由RealNetworks开发和维护的多类型媒体服务器。
        Helix Universal Server对部分POST请求字段数据缺少正确处理,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        远程攻击者只要发送特殊构建的带Content-Length头设置为'-1'的HTTP POST请求,可导致目标服务程序消耗大量内存和CPU资源,停止对正常服务的响应,产生拒绝服务。
        

- 公告与补丁

        厂商补丁:
        Real Networks
        -------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        For Linux:
        
        http://forms.real.com/rnforms/products/servers/download/download.final.html?platform=Linux+version+2.4.18&product=Helix+Universal+Server&program=basic&version=Helix+Universal+Server

        For Sun Solaris:
        
        http://forms.real.com/rnforms/products/servers/download/download.final.html?platform=Sun+Solaris+2.8&product=Helix+Universal+Server&program=basic&version=Helix+Universal+Server

        For Windows:
        
        http://forms.real.com/rnforms/products/servers/download/download.final.html?platform=Windows+NT+4.0+%26+2000&product=Helix+Universal+Server&program=basic&version=Helix+Universal+Server

        或者下载Helix Mobile Universal Server and Gateway (10.04.1226):
        
        http://service.real.com/pam/

- 漏洞信息 (F34615)

iDEFENSE Security Advisory 2004-10-07.t (PacketStormID:F34615)
2004-10-13 00:00:00
iDefense Labs  idefense.com
advisory,remote,denial of service
CVE-2004-0774
[点击下载]

iDEFENSE Security Advisory 10.07.04 - Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Server could allow an attacker to restart and potentially disable the server.

RealNetworks Helix Server Content-Length Denial of Service Vulnerability

iDEFENSE Security Advisory 10.07.04:
www.idefense.com/application/poi/display?id=151&type=vulnerabilities
October 7, 2004

I. BACKGROUND

RealNetworks Helix Universal Server is a universal digital media
delivery platform with industry leading performance, integrated content
distribution and Web services support. More information is available at
http://www.realnetworks.com.

II. DESCRIPTION

Remote exploitation of a denial of service (DoS) vulnerability in
RealNetworks, Inc.'s Helix Server could allow an attacker to restart and
potentially disable the server.

The problem specifically exists in the handling of specially crafted
POST requests. Generating a request with the Content-Length header set
to -1 triggers an integer handling error resulting in mass utilization
of memory and CPU time.

III. ANALYSIS

Any unauthenticated remote attacker can exploit this vulnerability,
which causes the affected system to utilize mass amounts of memory and
CPU time. The system will no longer be able to process future requests.

The affected server must be restarted in order to resume normal
functionality.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in
RealNetworks Helix Server version 9.0.2 for Linux and version 9.0.3 for
Windows. It is suspected that earlier versions on both platforms are
vulnerable as well.

V. WORKAROUND

Usage of an inline application level filter can help mitigate risk of
exploitation by scanning for and filtering invalid Content-Length
parameters.

VI. VENDOR RESPONSE

"Customers are encouraged to upgrade their Server software to the latest
version, which contains a security patch."

RealNetworks has released binaries that guard against the described
vulnerability. The related advisory from RealNetworks is available at:

    http://service.real.com/help/faq/security/security100704.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2004-0774 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

07/01/2004   Initial vendor notification
07/01/2004   iDEFENSE clients notified
08/05/2004   Initial vendor response
10/07/2004   Coordinated public Disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
    

- 漏洞信息

10556
RealNetworks Helix Universal Server HTTP POST Request DoS
Denial of Service
Loss of Availability Patch / RCS
Vendor Verified

- 漏洞描述

- 时间线

2004-10-07 Unknow
Unknow 2004-10-07

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, RealNetworks has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Real Networks Helix Universal Server Remote Integer Handling Denial Of Service Vulnerability
Input Validation Error 11352
Yes No
2004-10-07 12:00:00 2009-07-12 07:06:00
The discoverer of this vulnerability wishes to remain anonymous.

- 受影响的程序版本

Real Networks Helix Universal Mobile Server 10.3.1 .716
Real Networks Helix Universal Mobile Server 10.1.1 .120
Real Networks Helix Universal Mobile Gateway 10.3.1 .716
Real Networks Helix Universal Mobile Gateway 10.1.1 .120
Real Networks Helix Universal Gateway 9.0.2 .881
Real Networks Helix Universal Gateway 9.0

- 漏洞讨论

A remote integer handling denial of service vulnerability affects the Real Networks Helix Universal Server. The problem surrounds the mishandling of some POST headers values.

An attacker can exploit this issue to cause the affected server to consume excessive computer resources and hang, denying service to legitimate users.

- 漏洞利用

No exploit is required to leverage this issue.

- 解决方案

Real Networks has released an advisory dealing with this issue. Please see the referenced advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站