TUCoPS :: Web :: Servers :: oracle1.htm

Oracle application server 4.0.8.2 + iWS 4.0/4.1 webserver Exploitable Buffer Overflow
Vulnerability

    Oracle

Affected

    Oracle application server 4.0.8.2 + iWS 4.0/4.1 webserver

Description

    Following is based on a  S.A.F.E.R. Security Bulletin 0016.   They
    have been  able to  reproduce this  on 2  different machines, with
    very similar setup.

    An exploitable  buffer overflow  has been  identified in  a shared
    library  which  is  being  shipped  with Oracle Application Server
    4.0.8.2, and  used by  iPlanet Web  Server if  it is configured as
    external web-listener.

    iWS has  to be  configured as  external `web  listener' for Oracle
    Application  Server,  so  that  iWS  will  load  a  shared library
    ($ORAHOME/ows/4.0/lib/ndwfn4.so)  to  handle  requests  for   OAS.
    Overflow happens when a long string is requested with prefix  that
    has been `linked' to OAS (by  default it is /jsp/). which is  then
    passed to the  library routines to  be processed.   Buffer size is
    around 2050-60 bytes.

    A request similar to:

        GET /jsp/<A x 2050> HTTP/1.0

        (perl -e 'print "GET /jsp/","A"x2050," HTTP/1.0\n\n"' | nc victim 80)

    will trigger the overflow  (iWS webserver should core-dump  and be
    restarted by  watchdog; externally  it will  be seen  as a dropped
    connection).   It  is  also   possible  that  other  versions   of
    OAS/iWS/Solaris are vulnerable.

    S.A.F.E.R. have developed a working exploit for this problem which
    will be publicly released.  Credit goes to Fyodor Yarochkin.

Solution

    Oracle has been contacted, but they haven't been able to reproduce
    this problem.  S.A.F.E.R. would appreciate if people using OAS/iWS
    could test  this against  their servers  and let  both us know the
    results as other versions of  the software might be vulnerable  as
    well (tested on Solaris).   Oracle Security Team would  appreciate
    the results to be sent to secalert_us@oracle.com and S.A.F.E.R. to
    security@relaygroup.com.  No  fixes are available  at the time  of
    this writing.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH