[Full-Disclosure] Unchecked Buffer in Jana Web Server

From: Matthew Murphy (mattmurphyat_private)
Date: Mon Aug 05 2002 - 15:38:45 PDT

  • Next message: Matthew Murphy: "[Full-Disclosure] Cross-Site Scripting Attacks Possible At Multiple Webspace Provid ers"

    Security Advisory: Unchecked Buffer in Jana Web Server
    
        Jana Web Server has been the focus of several recent discoveries,
    including several buffer overrun vulnerabilities.  Yet another exploitable
    overflow exists in the Jana Web Server.
    
        Jana Web Server does not properly check the size of the HTTP
    request method input by the user before storing it, resulting in a stack
    overflow.
    
        If the method sufficiently exceeds the allocated storage, EIP will be
    overwritten.
    
    Example:
    
    [buffer] / HTTP/1.0
    
    The buffer can't contain any of the following chars:
    
    0x00 - duh
    0x0D - CR
    0x0A - LF (both end our request line)
    0x20 - space; this terminates the method portion
    
    Exploitability is still in testing.
    
    "The reason the mainstream is thought
    of as a stream is because it is
    so shallow."
                         - Author Unknown
    ---------------------------------------------------------------------
    
    This message (including any attachments) contains confidential
     information intended for a specific individual and purpose, and
     is protected by law. If you are not the intended recipient, you
     should delete this message and are hereby notified that any
     disclosure, copying, or distribution of this message, or the taking
     of any action based on it, is strictly prohibited.
    
    
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Full-Disclosureat_private
    http://lists.netsys.com/mailman/listinfo/full-disclosure
    



    This archive was generated by hypermail 2b30 : Mon Aug 05 2002 - 23:42:09 PDT