Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Marc Maiffret (marc_at_eeye.com)
Date: Tue Nov 12 2002 - 14:46:57 CST
Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities
November 12, 2002
High (Remote SYSTEM level code execution)
Macromedia Coldfusion 6.0 and prior (IIS ISAPI)
Macromedia JRun 4.0 and prior (IIS ISAPI)
Macromedia JRun and ColdFusion IIS ISAPI handlers contain various heap
overflows when handling URI filenames. By supplying a filename over 4096
bytes in size, heap memory can be overwritten. Various structures can be
overwritten in the process heap to gain control of the remote IIS process
with SYSTEM level access. This makes it rather trivial for attackers to
remotely compromise Microsoft IIS web servers running vulnerable versions of
Macromedia Coldfusion or JRun.
The following requests can be used to duplicate the attack.
telnet example.com 80
GET /[+4096 byte buffer].jsp HTTP/1.0
telnet example.com 80
GET /[+4096 byte buffer].cfm HTTP/1.0
During testing, 5000 bytes was sufficient to begin overwriting data
structures that made exploitation straightforward. The vulnerabilities exist
in error handling within the ISAPI filters.
eEye Digital Security customers using SecureIIS are protected from the
exploitation of this vulnerability.
Macromedia has released patches for both the JRun and Coldfusion products.
ColdFusion MX Advisory:
Credit: Riley Hassell, Research Engineer - eEye Digital Security
Greetings: Eli, Kasia, Jenn, Hx2, and the all the crazy kiwi's with hackfu
Copyright (c) 1998-2002 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express consent of
eEye. If you wish to reprint the whole or any part of this alert in any
other medium excluding electronic medium, please e-mail alerteEye.com for
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.
Please send suggestions, updates, and comments to:
eEye Digital Security