30th May 2002 [SBWID-5379]
COMMAND
Macromedia JRun remote buffer overflow.
SYSTEMS AFFECTED
version 3.1
PROBLEM
In NGSSoftware Insight Security Research Advisory #NISR29052002, David
Litchfield found following bug:
Macromedia\'s JRun, previously owned by Allaire, is a J2EE Server
designed to run on web servers to deliver java based online
applications. The Win32 version 3.1 contains a remotely exploitable
buffer overrun vulnerability that allows an attacker to gain complete
control of the server in question.
When JRun is installed, an ISAPI filter/application is stored in the
/scripts virtual directory. If a request comes into the server for a
.jsp resource the JRun filter handles the request. Further, if the
ISAPI DLL is accessed directly it acts as an application. By making a
request to the DLL with an overly long Host header field, a saved
return address is overwritten on the stack allowing an attacker to gain
control over the process\' execution. As the jrun DLL is loaded into
the address space of the web service process, inetinfo.exe, on both
Internet Information Server 4 and 5, any code supplied in an exploit
will run in the security context of the local SYSTEM account.
SOLUTION
Upgrade to version 4, or apply following patch:
http://www.macromedia.com/v1/Handlers/index.cfm?ID=22273&Method=Full
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH