OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
From: Dave Ahmad (dasecurityfocus.com)
Date: Mon Jul 08 2002 - 16:59:27 CDT

  • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

    ---------- Forwarded message ----------
    Return-Path: <labsfoundstone.com>
    Delivered-To: dasecurityfocus.com
    Received: (qmail 7643 invoked from network); 8 Jul 2002 21:57:16 -0000
    Received: from unknown (HELO mission.foundstone.com) (66.192.0.2)
      by mail.securityfocus.com with SMTP; 8 Jul 2002 21:57:16 -0000
    X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
    content-class: urn:content-classes:message
    MIME-Version: 1.0
    Content-Type: text/plain;
            charset="us-ascii"
    Content-Transfer-Encoding: quoted-printable
    Subject: Foundstone Advisory - Buffer Overflow in MyWebServer
    Date: Mon, 8 Jul 2002 15:03:44 -0700
    Message-ID: <9DC8A3D37E31E043BD516142594BDDFAC475B2MISSION.foundstone.com>
    X-MS-Has-Attach:
    X-MS-TNEF-Correlator:
    Thread-Topic: Foundstone Advisory - Buffer Overflow in MyWebServer
    Thread-Index: AcImy1QmoQ4mhAPnTnaAiGRmcRu0VQ==
    From: "Foundstone Labs" <labsfoundstone.com>
    To: <dasecurityfocus.com>

    ----------------------------------------------------------------------
    FS Advisory ID: FS-070302-24-MWSX

    Release Date: July 3rd, 2002

    Product: MyWebServer

    Vendor: MyWebServer (http://www.mywebserver.org)

    Vendor Advisory: See vendor web site

    Type: Buffer Overflow

    Severity: High

    Author: Robin Keir (robin.keirfoundstone.com)
                                    Foundstone, Inc.
                                    (http://www.foundstone.com)

    Operating Systems: Windows variants

    Vulnerable versions: MyWebServer v1.02 and previous

    Foundstone Advisory: http://www.foundstone.com/advisories.htm
    ---------------------------------------------------------------------

    Description

    A buffer overflow exists in versions 1.02 and previous of MyWebServer.
    Exploitation of this vulnerability allows remote execution of arbitrary
    code
    with daemon privileges.

    Details

    Sending a GET request containing a URL of approx. 1000 characters or
    more causes
    MyWebServer to crash. Exploitation is possible and proof of concept
    code has been
    authored demonstrating this problem.

    Solution:

    Refer to the vendor's web site for further details:
    http://www.mywebserver.org

    Disclaimer:

    The information contained in this advisory is copyright (c) 2002
    Foundstone, Inc. and is believed to be accurate at the time of
    publishing, but no representation of any warranty is given,
    express, or implied as to its accuracy or completeness. In no
    event shall the author or Foundstone be liable for any direct,
    indirect, incidental, special, exemplary or consequential
    damages resulting from the use or misuse of this information.
    This advisory may be redistributed, provided that no fee is
    assigned and that the advisory is not modified in any way.