EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities

From: Marc Maiffret (marcat_private)
Date: Tue Nov 12 2002 - 12:44:41 PST

  • Next message: Tim Brown: "Fresh hole in W3Mail (fwd)"

    Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities
    
    Release Date:
    November 12, 2002
    
    Severity:
    High (Remote SYSTEM level code execution)
    
    Systems Affected:
    Macromedia Coldfusion 6.0 and prior (IIS ISAPI)
    Macromedia JRun 4.0 and prior (IIS ISAPI)
    
    Description:
    Macromedia JRun and ColdFusion IIS ISAPI handlers contain various heap
    overflows when handling URI filenames. By supplying a filename over 4096
    bytes in size, heap memory can be overwritten. Various structures can be
    overwritten in the process heap to gain control of the remote IIS process
    with SYSTEM level access. This makes it rather trivial for attackers to
    remotely compromise Microsoft IIS web servers running vulnerable versions of
    Macromedia Coldfusion or JRun.
    
    The following requests can be used to duplicate the attack.
    
    For JRun:
    telnet example.com 80
    GET /[+4096 byte buffer].jsp HTTP/1.0
    [enter]
    [enter]
    
    For Coldfusion:
    telnet example.com 80
    GET /[+4096 byte buffer].cfm HTTP/1.0
    [enter]
    [enter]
    
    During testing, 5000 bytes was sufficient to begin overwriting data
    structures that made exploitation straightforward. The vulnerabilities exist
    in error handling within the ISAPI filters.
    
    Protection:
    eEye Digital Security customers using SecureIIS are protected from the
    exploitation of this vulnerability.
    http://www.eeye.com/SecureIIS
    
    Vendor Status:
    Macromedia has released patches for both the JRun and Coldfusion products.
    ColdFusion MX Advisory:
    http://www.macromedia.com/v1/handlers/index.cfm?ID=23161
    JRun Advisory:
    http://www.macromedia.com/v1/handlers/index.cfm?ID=23500
    
    Credit: Riley Hassell, Research Engineer - eEye Digital Security
    
    Greetings: Eli, Kasia, Jenn, Hx2, and the all the crazy kiwi's with hackfu
    
    Copyright (c) 1998-2002 eEye Digital Security
    Permission is hereby granted for the redistribution of this alert
    electronically. It is not to be edited in any way without express consent of
    eEye. If you wish to reprint the whole or any part of this alert in any
    other medium excluding electronic medium, please e-mail alertat_private for
    permission.
    
    Disclaimer
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition. There are
    NO warranties with regard to this information. In no event shall the author
    be liable for any damages whatsoever arising out of or in connection with
    the use or spread of this information. Any use of this information is at the
    user's own risk.
    
    Feedback
    Please send suggestions, updates, and comments to:
    
    eEye Digital Security
    http://www.eEye.com
    infoat_private
    



    This archive was generated by hypermail 2b30 : Tue Nov 12 2002 - 19:38:55 PST