iPlanet - Netscape Enterprise Web Publisher Buffer Overflow

From: Marc Maiffret (marcat_private)
Date: Tue May 15 2001 - 16:08:54 PDT

  • Next message: Hux Flux: "iis exploit (fixed)"

    iPlanet – Netscape Enterprise Web Publisher Buffer Overflow
    
    Release Date:
    May 11, 2001
    
    Severity:
    High (Remote SYSTEM level code execution)
    
    Systems Affected:
    Netscape Enterprise 4.1 and prior versions.
    
    Description:
    The Web Publisher feature in Netscape Enterprise 4.1 is vulnerable to a
    buffer overflow. By sending a large buffer containing executable code and a
    new Instruction Pointer, an attacker is able to gain remote system shell
    access to the vulnerable server.
    
    The overflow itself exists in Publishers handling of the URI (Uniform
    Resource Identifier). By specifying GETPROPERTIES, GETATTRIBUTENAMES, or any
    other one of the publisher specific methods, we can pass data into
    vulnerable section of the server and exploit the vulnerability.
    
    Example:
    C:\>telnet www.example.com 80
    Connecting To www.example.com... connected.
    GETPROPERTIES /(buffer) HTTP/1.1
    Host: Hostname
    (enter)
    (enter)
    
    Where (buffer) is 2000 characters.
    
    The Exploit:
    We have not had time yet to produce a proof of concept exploit, however
    expect one soon.
    
    Vendor Status:
    Quote from iPlanet's development team: "The security & stability of
    iPlanet's customer's environments is one of our paramount concerns. To
    ensure the stability of our customer's environments iPlanet has made
    available an NSAPI patch that can be applied to iPlanet Web Server,
    Enterprise Edition."
    
    The NSAPI patch is available at:
    http://iplanet.com/products/iplanet_web_enterprise/iwsalert5.11.html .
    This issue will also be addressed by the release of iPlanet Web Server,
    Enterprise Edition version 4.1 Service Pack 8.
    
    Credit:
    Riley Hassell (rileyat_private)
    
    Related Links:
    SecureIIS, Stop known and unknown IIS web server vulnerabilities.
    http://www.eeye.com/SecureIIS
    
    Retina, The Network Security Scanner. http://www.eeye.com/Retina
    
    Greetings:
    Tool for an amazing new album. NiN for another beautiful single.
    
    Copyright (c) 1998-2001 eEye Digital Security
    Permission is hereby granted for the redistribution of this alert
    electronically. It is not to be edited in any way without express consent of
    eEye. If you wish to reprint the whole or any part of this alert in any
    other medium excluding electronic medium, please e-mail alertat_private for
    permission.
    
    Disclaimer
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition. There are
    NO warranties with regard to this information. In no event shall the author
    be liable for any damages whatsoever arising out of or in connection with
    the use or spread of this information. Any use of this information is at the
    user's own risk.
    
    Feedback
    Please send suggestions, updates, and comments to:
    
    eEye Digital Security
    http://www.eEye.com
    infoat_private
    



    This archive was generated by hypermail 2b30 : Wed May 16 2001 - 02:39:18 PDT