Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Web Server/CGI)  >   Sambar Server Vendors:   Sambar Technologies
Sambar Server 'results.stm' POST Request Buffer Overflow May Permit Remote Code Execution
SecurityTracker Alert ID:  1008979
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 8 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 6.0
Description:   A stack overflow vulnerability was reported in the Sambar Server in the processing of HTTP POST requests. A remote user may be able to cause the web service to crash or possibly execute arbitrary code.

A remote user can reportedly send specially crafted data via a POST request to '/search/results.stm' to trigger a buffer overflow.

A demonstration exploit script using the SMUDGE tool is provided in the Source Message.

Impact:   A remote user may be able to cause the web service to crash. A remote user may be able to execute arbitrary code, however, the report indicates that arbitrary code execution is difficult to achieve.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 21 2004 (Vendor Issues Fix) Sambar Server 'results.stm' POST Request Buffer Overflow May Permit Remote Code Execution
The vendor has issued a fix.

 Source Message Contents

Date:  Fri, 6 Feb 2004 17:35:30 -0800 (PST)
Subject:  Sambar 6.0 stack overflow

Hi lists,
The following SMUDGE ( script will 
cause a (difficult to exploit) stack overflow in a default set up of the 
Sambar web server.

--- start script
# Sambar script (c)
from SMUDGE import *
import sys
sm = SMUDGE(1)


sm.plain("POST /search/results.stm HTTP/1.1")
sm.plain("Host: MSUDGEDPU")
sm.plain("Content-Length: ")

-- end script

A modification of this script will also cause misc expections in the 
BadBlue webserver ;)

- endee



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC