TUCoPS :: Web :: Servers :: idefen1.txt

iDEFENSE Security Advisory 10.15.02 DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone


iDEFENSE Security Advisory 10.15.02:
http://www.idefense.com/advisory/10.15.02.txt
DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone
October 15, 2002

I. BACKGROUND

RadioBird Software's WebServer 4 Everyone is a free "Powerful,
MultiClient, yet Easy to handle and maintain, WebServer.". It is
available for download at http://www.freeware.lt/ .

II. DESCRIPTION

Issue 1:

Improper bounds checking allow attackers to launch a denial of
service (DoS) attack, causing the web server to crash. The condition
is triggered when the software receives a request for a long
filename, such as GET /AAAAAAAA...3000...AAAA HTTP/1.1 .

Issue 2:

A directory traversal issue exists. The software can be duped into
serving a restricted file. This is done if an attacker issues a
directory traversal request with the hexadecimal representation for
the front slash character (%2F). For example, if the URL
http://target.server/%2f..%2f..%2f../winnt/repair/sam were sent to a
target server, the SAM table would be retrieved.

A vulnerability exists that provides attackers access to arbitrary
files on the server running the application. 


III. ANALYSIS

For Issue 1, exploitation could allow an attacker to deny legitimate
users access to the server and the contents that it provides.

For Issue 2, exploitation allows an attacker to obtain sensitive
information, such as the Windows NT SAM table. This kind of
information can allow further compromise of the targeted host.
Sensitive information such as credit cards can also be retrieved.

Customers should note that an remote user with access to the
application can launch these attacks.

IV. DETECTION

iDEFENSE has confirmed the existence of both vulnerabilities in
WebServer 4 Everyone, versions 1.23 and 1.27. Earlier versions are
likely affected, as well. 

V. VENDOR FIX

Leonardas Survila of Radiobird Software released WebServer 4
Everyone, version 1.30, which fixes the problems. It is downloadable
at ftp://ftp.freeware.lt/anonymous/Soft/w4asetup.exe.

VI. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project 
assigned the identification number CAN-2002-1212 to Issue 1 and
CAN-2002-1213 to Issue 2.

VII. DISCLOSURE TIMELINE

10/06/2002	Issues disclosed to iDEFENSE
10/14/2002	Vendor notified via e-mail to ulterior@freeware.lt
10/14/2002	iDEFENSE clients notified
10/14/2002	Response received from Leonardas Survila
(leonardass@iki.lt)
10/15/2002	Vendor fix created
10/15/2002	Coordinated public disclosure

VIII. CREDIT

Tamer Sahin (ts@securityoffice.net) discovered both of these
vulnerabilities.


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide 
decision-makers, frontline security professionals and network 
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

dendler@idefense.com
www.idefense.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A

iQA/AwUBPaxMJkrdNYRLCswqEQIabQCdEXlBmEBU0u2z09zztLpto/p0GSEAoL2j
hG8hLEn20rIAAo6QitYW9/7M
=JI4s
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH