OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
From: Peter Gründl (peter.grundlDEFCOM.COM)
Date: Wed Mar 28 2001 - 04:00:12 CST

  • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

    ======================================================================
                      Defcom Labs Advisory def-2001-15

                       Website Pro Remote Manager DoS

    Author: Peter Gründl <peter.grundldefcom.com>
    Release Date: 2001-03-28
    ======================================================================
    ------------------------=[Brief Description]=-------------------------
    The remote manager service contains a flaw that allows an attacker to
    cause the service to crash.

    ------------------------=[Affected Systems]=--------------------------
    - Website Pro/3.0.37

    ----------------------=[Detailed Description]=------------------------
    The remote manager service (default on port 9999) will leak memory if
    non-authenticated requests are repeatedly made to the /dyn/ directory
    and will eventually get killed by the OS.

    eg:
    GET /dyn/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx HTTP/1.0
    host: 10.0.0.1

    ---------------------------=[Workaround]=-----------------------------
    Disallow access to the remote manager service from untrusted networks.
    The service is on TCP port 9999 by default.

    -------------------------=[Vendor Response]=--------------------------
    This issue was brought to the vendor's attention on the 21st of
    February, 2001 and although the vendor has been contacted repeatedly
    no workaround or fix has been received to this date.

    ======================================================================
                This release was brought to you by Defcom Labs

                  labsdefcom.com www.defcom.com
    ======================================================================