SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Savant (web server) Vendors:   Lamont, Michael
Multiple Bugs in Savant Webserver Allow Certain Remote Requests to Cause Denial of Service Conditions and Other Requests to Be Processed Without Being Logged
SecurityTracker Alert ID:  1003124
SecurityTracker URL:  http://securitytracker.com/id/1003124
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 5 2002
Impact:   Denial of service via network, Modification of user information
Exploit Included:  Yes  
Version(s): 3.0
Description:   Several vulnerabilities were reported in the Savant web server. A remote user can send a CGI request that will cause the server to crash and can send a different request that will not be logged.

SecurityOffice.net reported a denial of service vulnerability in the Savant web server. A remote user can send a long parameter several times to cause the server to crash. The following type of URL can be used to trigger this flaw:

http://host/cgi-bin/cgi-test.pl.......................................
......................................................................
......................................................................
...........................................................

[Editor's note: A similar bug was reported in April 2001]

Cgisecurity.com reported a logging vulnerability in the web server. A remote user can send a file request to the server and it will not be logged. The following type of URL can be used to demonstrate this flaw:

HEAD /file http/1.0

The vendor has been notified of both vulnerabilities.

Impact:   A remote user can cause the server to crash. A remote user can issue a file request that will not be logged by the server.
Solution:   No solution was available at the time of this entry.
Vendor URL:  savant.sourceforge.net/index.html (Links to External Site)
Cause:   Exception handling error
Underlying OS:   Windows (Me), Windows (NT), Windows (95), Windows (98), Windows (2000)

Message History:   None.


 Source Message Contents

Date:  Sat, 5 Jan 2002 20:41:44 +0200
Subject:  [VulnWatch] Savant Webserver Buffer Overflow Vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Savant Webserver Buffer Overflow Vulnerability

Type:
DoS, crashes Daemon

Release Date:
January 5, 2002

Product / Vendor:
Savant is a freeware open source web server that runs on Windows 95,
98, ME, NT, and 2000, turning any desktop computer into a powerful
web server.  Designed to be fast, secure, and efficient, Savant is
the choice of thousands of professional and amateur webmasters
worldwide.

http://savant.sourceforge.net

Summary:
Server crashes after sending very long parameter a few times.

http://host/cgi-bin/cgi-test.pl.......................................
......................................................................
......................................................................
...........................................................

The instruction at "0x002e2e3d" referenced memory at "0xac40303c".
The memory could not be "written".

Log:
Error File: <error.txt>
- -
- -
- -
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process

Tested:
Windows 2000 / Savant 3.0

Vulnerable:
Savant 3.0 (And may be other)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPDcsyLuLpFMrXtywEQILHQCePykGavuFDzyuhv3QEJvJj69IT2gAn0w0
N2KarHO/eJUF9oapdNikgNam
=gpy0
-----END PGP SIGNATURE-----






 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC