2nd Buffer Overflow in Talentsoft's Web+ (#NISR13032002)

From: NGSSoftware Insight Security Research (nisrat_private)
Date: Wed Mar 13 2002 - 05:00:41 PST

  • Next message: Adam: "Re: zlibscan : script to find suid binaries possibly affected by zlib vulnerability"

    NGSSoftware Insight Security Research Advisory
    
    Name:                  Web+ Buffer Overflow
    Systems Affected: Web+ 4.6/5.0 on Windows NT/2000, Solaris, Linux
    Severity:               High Risk
    Vendor URL:        http://www.talentsoft.com
    Author:                 David Litchfield (davidat_private)
    Date:                    13th March 2002
    Advisory number: #NISR13032002
    Advisory URL:     http://www.ngssoftware.com/advisories/webplus2.txt
    
    Issue: Attackers can run arbitrary code as SYSTEM.
    
    Description
    ***********
    Talentsoft's Web+ v5.0 is a powerful and comprehensive development
    environment for use in creating web-based client/server applications.
    
    Details
    *******
    Web Markup Language (wml) scripts files are created that contain the
    application logic. These are requested by a web client from the web server
    using either an ISAPI filter (webplus.dll) or a CGI executable
    (webplus.exe). These are known as Web+ clients. The Web+ client passes this
    request to the Web+ plus server for dispatch. When a request is made for an
    overly long wml file an unchecked buffer is overflowed and the saved return
    address on the stack is overwritten. In this fashion an attacker can gain
    control over the Web+ server's path of execution. By pointing the process'
    execution back into the user supplied buffer arbitrary code can be executed.
    On Windows machines, as the service runs with SYSTEM privileges any code
    executed will run uninhibited. This is also true of unix systems if the
    server is running as root.
    
    
    Fix Information
    ***************
    This overflow was discovered on the 6th of March after Talentsoft had
    provided a fix for an overflow discovered by NGSSoftware in Februrary.
    TalentSoft withdrew this patch to fix this second overflow issue. This patch
    has been re-issued and is available from
    http://www.talentsoft.com/Issues/IssueDetail.wml?ID=WP943. NGSSoftware urges
    all Web+ customers to apply this as soon as is possible.
    
    A check for this issue has been added to Typhon II, of which more
    information is available from the NGSSoftware website,
    http://www.ngssoftware.com.
    
    Risk Mitigation
    ***************
    It is suggested that an low privileged account be created and this account
    should be used to run the Web+ services -  this includes the Monitoring
    Service and the Server itself.
    
    Further Information
    *******************
    
    For further information about the scope and effects of buffer overflows,
    please see
    
    http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
    http://www.ngssoftware.com/papers/ntbufferoverflow.html
    http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
    http://www.ngssoftware.com/papers/unicodebo.pdf
    



    This archive was generated by hypermail 2b30 : Wed Mar 13 2002 - 11:53:55 PST