what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

analogx.www.txt

analogx.www.txt
Posted Jan 2, 2000
Authored by Underground Security Systems Research

Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms.

tags | exploit, remote, web, overflow, local
systems | windows
SHA-256 | f32cc26c35f248387c89abcf98c9b455c102dc43abfc74dc606030682ad55800

analogx.www.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Happy New Year! to All!!


Local / Remote GET Buffer Overflow Vulnerability in AnalogX
SimpleServer:WWW HTTP Server v1.1

USSR Advisory Code: USSR-99029

Release Date:
December 31, 1999 [5/5] (not the original one), original [5/5] will
be released 15/01/1900 :)

Systems Affected:
AnalogX SimpleServer:WWW HTTP Server v1.1 for Win9x and possibly
others versions.

About The Software:
Introducing AnalogX SimpleServer:WWW, the first in a series of simple
to use yet
powerful servers! This webserver is SO easy to use, about the only
thing you need
to know how to do is drag and drop files; then just click on the
'Start' button, and
you're webserver is up and running, serving your pages to the world!
SimpleServer:WWW supports MIME file typing, CGI, common log format,
and multi-hosting, just to name a few! If you've always wanted a
compact,
easy to use, versatile webserver, then you're prayers have been
answered.

THE PROBLEM

UssrLabs found a Local / Remote Buffer overflow, The code that
handles GET commands
has an unchecked buffer that will allow arbitrary code to be executed
if it is overflowed.

Do you do the w00w00?
This advisory also acts as part of w00giving. This is another
contribution
to w00giving for all you w00nderful people out there. You do know
what
w00giving is don't you? http://www.w00w00.org/advisories.html

Example
[hell@imahacker]$ telnet die.communitech.net 80
Trying example.com...
Connected to die.communitech.net
Escape character is '^]'.
GET (buffer) HTTP/1.1 <enter><enter>

Where [buffer] is aprox. 1000 characters. At his point the server
overflows.

And in remote machine someone will be see something like this.

HTTP caused an invalid page fault in
module <unknown> at 0000:41414141.
Registers:
EAX=00afffbc CS=017f EIP=41414141 EFLGS=00010246
EBX=00afffbc SS=0187 ESP=00af0060 EBP=00af0080
ECX=00af0104 DS=0187 ESI=816294f0 FS=0e47
EDX=bff76855 ES=0187 EDI=00af012c GS=0000
Bytes at CS:EIP:

Stack dump:
bff76849 00af012c 00afffbc 00af0148 00af0104 00af0238 bff76855
00afffbc 00af0114 bff87fe9 00af012c 00afffbc 00af0148 00af0104
41414141 00af02f0

Binary or source for this Exploit (wen we finish it):

http://www.ussrback.com/

Vendor Status:
Informed.

Vendor Url: http://www.analogx.com/
Program Url:
http://www.analogx.com/contents/download/network/sswww.htm

Credit: USSRLABS

SOLUTION
Noting yet.

Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, ADM, L0pht, HNN, Brock
Tellier, Technotronic and
Wiretrip.

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c
h
http://www.ussrback.com


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBOGxnX9ybEYfHhkiVEQJfPgCghGxZoscsKViKd3Uh4bBBolTJMo4AoIXm
3LuzCgF1g3827IQRfuP5qtZw
=Nksc
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close