|
COMMAND Tomahawks SteelArrow Multiple Remote Buffer Overruns SYSTEMS AFFECTED ? PROBLEM Mark Litchfield [mark@ngssoftware.com] [http://www.ngssoftware.com] advisory number [#NISR19082002B] : Buffer Overrun 1) SteelArrow tracks user sessions with cookies in the form of UserIdent=XXXXXXXXXXXX. By supplying an overly long vlaue in the Cookie HTTP header a buffer overflow occurs in the Steelarrow Service (Steelarrow.exe) overwriting a saved return address on the stack. Steelarrow, by default on Win2k/WinNT is installed as a system service. Any arbitary code executed using this vulnerability will run with system privileges. Buffer Overrun 2) By making an overly long request for a .aro (extension used by Steelarrow) file, an access violation occurs in DLLHOST.EXE (Steelarrow.dll), again overwriting a saved return address on the stack. Any code will execute in the security context of the IWAM account. Buffer Overrun 3) It's that Chunked Transfer-Encoding issue again. By making a request for a .aro file an including a specific Transfer-Encoding: Chunked request within the HTTP request header fields and access violation occurs in DLLHOST.EXE due to a heap overflow. Again any arbitary code execution will run in the context of the IWAM account. SOLUTION