CVE-2004-1763
CVSS10.0
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 23:00:30
NMCO    

[原文]Buffer overflow in hsrun.exe for HAHTsite Scenario Server 5.1 Patch 06 (build 91) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long project name.


[CNNVD]HAHTsite Scenario Server项目文件名缓冲区溢出漏洞(CNNVD-200412-636)

        HAHTsite Scenario Server 5.1 Patch 06(组建91)版本存在缓冲区溢出漏洞。远程攻击者可以借助超长项目名称导致服务拒绝(崩溃)并且可能执行任意代码。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_4
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_5
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_1
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_6
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_2
cpe:/a:haht_commerce:hahtsite_scenario_server:5.1_patch_3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1763
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1763
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-636
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=108091662105032&w=2
(UNKNOWN)  FULLDISC  20040402 Buffer Overflow in HAHTsite Scenario Server 5.1
http://www.kb.cert.org/vuls/id/705958
(VENDOR_ADVISORY)  CERT-VN  VU#705958
http://www.securityfocus.com/bid/10033
(PATCH)  BID  10033
http://xforce.iss.net/xforce/xfdb/15717
(UNKNOWN)  XF  hahtsite-long-request-bo(15717)

- 漏洞信息

HAHTsite Scenario Server项目文件名缓冲区溢出漏洞
危急 缓冲区溢出
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        HAHTsite Scenario Server 5.1 Patch 06(组建91)版本存在缓冲区溢出漏洞。远程攻击者可以借助超长项目名称导致服务拒绝(崩溃)并且可能执行任意代码。

- 公告与补丁

        HAHTsite has released a downloadable patch for Windows platforms.
        Users of the software on Solaris and Linux platforms should inquire about fixes from HAHT Technical Support via the following e-mail address:
        support@haht.com
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 6
        
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 3
        
        HAHT Commerce HAHTsite Scenario Server 5.1
        
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 2
        
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 5
        
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 1
        
        HAHT Commerce HAHTsite Scenario Server 5.1 Patch 4
        

- 漏洞信息

4939
HAHTsite Scenario Server inhsrun.exe Project Name Overflow
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

HAHTsite Scenario Server contains a flaw that may allow a malicious user to overrun an allocated buffer. The issue is triggered when an attacker requests a very long Project Name on the URI. It is possible that the flaw may allow a remote attacker to execute arbitrary commands on the server, resulting in a loss of integrity.

- 时间线

2004-04-02 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, HAHT Commerce has released a patch (post-Patch 06 security fix - ox79989 ), discussed in KB 20030010, for Windows and Solaris platforms that addresses this vulnerability. Linux users are advised to contact HAHT Technical Support.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站