TUCoPS :: Windows Apps :: win5379.htm

Macromedia JRun remote buffer overflow.
30th May 2002 [SBWID-5379]
COMMAND

	Macromedia JRun remote buffer overflow.

SYSTEMS AFFECTED

	version 3.1

PROBLEM

	In NGSSoftware Insight Security Research Advisory  #NISR29052002,  David
	Litchfield found following bug:
	

	Macromedia\'s JRun, previously  owned  by  Allaire,  is  a  J2EE  Server
	designed  to  run  on  web  servers  to  deliver   java   based   online
	applications. The Win32 version  3.1  contains  a  remotely  exploitable
	buffer overrun vulnerability that allows an attacker  to  gain  complete
	control of the server in question.
	

	When JRun is installed, an ISAPI filter/application  is  stored  in  the
	/scripts virtual directory. If a request comes into  the  server  for  a
	.jsp resource the JRun filter  handles  the  request.  Further,  if  the
	ISAPI DLL is accessed directly it acts as an application.  By  making  a
	request to the DLL with an  overly  long  Host  header  field,  a  saved
	return address is overwritten on the stack allowing an attacker to  gain
	control over the process\' execution. As the jrun  DLL  is  loaded  into
	the address space of the web  service  process,  inetinfo.exe,  on  both
	Internet Information Server 4 and 5, any code  supplied  in  an  exploit
	will run in the security context of the local SYSTEM account.

SOLUTION

	Upgrade to version 4, or apply following patch:
	

	

	http://www.macromedia.com/v1/Handlers/index.cfm?ID=22273&Method=Full

	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH