what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DartWebserver.dll 1.9.2 Null Pointer Dereference

DartWebserver.dll 1.9.2 Null Pointer Dereference
Posted Apr 9, 2013
Authored by catatonicprime

DartWebserver.dll version 1.9.2 suffers from a null pointer dereference denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2012-5389
SHA-256 | d201bd7a36fcea870aad04534a979594fe58f5895eead86ee5d8a10913d8604a

DartWebserver.dll 1.9.2 Null Pointer Dereference

Change Mirror Download
Overview
===============
DartWebserver.Dll is an HTTP server provided by Dart Comunications
(dart.com). It is distributed in their PowerTCP/Webserver For ActiveX
product and likely other similar products.

"Build web applications in any familiar software development
environment. Use WebServer for ActiveX to add web-based access to
traditional compiled applications."

Version 1.9.2 and prior is vulnerable to a null pointer dereference,
these maybe generated by making a malformed request to the server.

Analysis
===============
During the processing of incoming HTTP requests the server may process
malformed requests leading to the a null pointer dereference, this
causes an exception which is not handled and the parent process
crashes. This will lead to a Denial of Service (DoS) condition. To my
knowledge this bug can *not* be used to gain access to any other CPU
registers.

The malformed packet of the format:

GET / HTTP/1.1\nContent-Length:-1\n\n

The reliability of this bug is low, requiring upwards of several
hundred requests to be processed before causing the exception. This
may be system specific, relying heavily on the host operating system's
pre-existing condition. So, if at first you do not succeed in
replicating this bug - try and try again.

Timeline
===============
10/15/2012 - Contacted vendor with an incident report.
10/15/2012 - Contacted Mitre for CVE assignment
10/17/2012 - CVE-ID Assigned
10/18/2012 - Contacted vendor with assigned CVE-ID
10/19/2012 - Vendor replied with questions about the incident report
and vulnerability
10/19/2012 - Incident report found, vulnerability details clarified
10/30/2012 - Vendor contacted researcher with an update of the status
of the bug report, indicating they do not have time to investigate the
cause of the vulnerability.
04/08/2013 - Public disclosure to Bugtraq.

More information
===============
To see more of my work and research, stop by to visit and follow my blog:
http://sadgeeksinsnow.blogspot.com/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close