exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

safer.000229.EXP.1.3

safer.000229.EXP.1.3
Posted Mar 1, 2000
Site safermag.com

S.A.F.E.R. Security Bulletin 000229.EXP.1.3 - Buffer Overflow in Netscape Enterprise Server. Netscape Enterprise Server is a web server with long history of security problems. We have tested version 3.6 SP2 on Windows NT 4.0 Server edition, and found it to be vulnerable to a buffer overflow. Remote execution of code is possible.

tags | remote, web, overflow
systems | windows
SHA-256 | d053aee89b0c0a4dcc75a3dbfdd74f0302c8844a94db145a8258559dc6a98329

safer.000229.EXP.1.3

Change Mirror Download
__________________________________________________________

S.A.F.E.R. Security Bulletin 000229.EXP.1.3
__________________________________________________________


TITLE : Buffer Overflow in Netscape Enterprise Server
DATE : February 29, 2000
NATURE : Denial-of-Service, Remote Code Execution
PLATFORMS : Windows NT 4.0, possibly others

DETAILS:

Netscape Enterprise Server is a web server with long history of security
problems. We have tested version 3.6 SP2 on Windows NT 4.0 Server
edition, and found it to be vulnerable to a buffer overflow.


PROBLEM:

A buffer overflow exists in Netscape Enterprise Server version 3.6 SP2,
and possibly others, which allows remote users to execute arbitrary
code. The request which will cause httpd.exe process to crash is (for
example):

GET /[4080 x 'A'] HTTP/1.0

The method seems not to be important at all, but the length of the
request does. You can use BLAH as a method (instead of GET), or any
other string you wish. Dr. Watson pops up with a message:

" Exception access violation (0xc0000005), Address 0x41414141 "

Remote execution of code is possible.


FIXES:

The problem is present in Netscape Enterprise Server 3.6 SP2, running
on Windows NT platform. We have also tested Netscape Enterprise Server
3.51I running on Solaris, and found it not to be vulnerable.

Until the official statement from Netscape is released, consider the
possibility that all versions are vulnerable.

We have tried to contact Netscape and inform them about vulnerabilities
(including this buffer overflow, and few others) in their web server,
but have received no reply (or acknowledgments) until now. This problem
has been found 3 months ago, Netscape has been contacted in January 2000
on several occasions. We would be happy if Netscape can contact us, so
that we can let them know about few more security problems that have
been found in Netscape Enterprise Server.


JOB OFFERS:

The Relay Group is seeking security enthusiasts with vast experience in
intrusion testing, and firewall/IDS configuration. For more information,
please visit:

https://relaygroup.com/secjobs.html


___________________________________________________________

S.A.F.E.R. - Security Alert For Entreprise Resources
Copyright (c) 2000, The Relay Group
https://www.safermag.com ---- security@relaygroup.com
___________________________________________________________

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close