Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Commerce)  >   Navision Financials Vendors:   Navision
Navision Financials Server Can Be Crashed Via the Network
SecurityTracker Alert ID:  1001222
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 3 2001
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): V2.50 for Windows NT/2000; V2.60 for Windows NT/2000
Description:   Defcom Labs issued an advisory (def-2001-17) for the Navision Financials accounting and financial management server product, indicating that a remote user can cause the server to crash.

A user can sending a null character followed by approximately 30k of A's to TCP port 2407 to cause a buffer overflow, terminating the Navision Financials process (SERVER.EXE). The advisory indicates that the overflow does not appear to allow execution of arbitrary code.

A smaller amount of data can also be sent to the server to silently kill the process. This requires approximately 10 connections, each starting with a null character followed by 100+ characters.

Impact:   A remote user can cause the server to crash.
Solution:   Contact the vendor to obtain a patch.
Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (AIX), UNIX (HP/UX), Windows (NT), Windows (2000)

Message History:   None.

 Source Message Contents

Subject:  def-2001-17: Navision Financials Server DoS

                  Defcom Labs Advisory def-2001-17

                   Navision Financials Server DoS

Release Date: 2001-04-03
------------------------=[Brief Description]=-------------------------
The Navision Financials Server contains a flaw that allows an attacker
to crash the service.

------------------------=[Affected Systems]=--------------------------
- Navision Financials Server V2.50 for Windows NT/2000
- Navision Financials Server V2.60 for Windows NT/2000

----------------------=[Detailed Description]=------------------------
Sending a null character followed by approx. 30k of A's to TCP port
2407 causes a buffer overflow and terminates the process (SERVER.EXE).
The overflow does not appear to be exploitable.

A smaller amount can also be used, and will silently kill the process.
This requires approx. 10 connections starting with a null character,
followed by 100+ characters.

Disallow access to TCP port 2407 from untrusted systems, and contact
Navision-Damgaard Support to obtain the patch for this problem:

-------------------------=[Vendor Response]=--------------------------
The issue was brought to the vendors attention on the 21st of
December, 2000. A patch was created by the vendor on the 5th of March,

            This release was brought to you by Defcom Labs



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC