what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

netscape.netware.txt

netscape.netware.txt
Posted Jun 27, 2000
Authored by Vigilante | Site vigilante.com

Netscape Enterprise Server for Netware 5.0 and Netware 5.1 contain remote vulnerbailities. By issuing a malformed URL it is possible to cause a denial of service situation and/or execute arbitrary code on the server with the privileges of the web server.

tags | exploit, remote, web, denial of service, arbitrary
SHA-256 | 87b98315b06d4cb218a9eb746cb54ba814c7a256db807a3dd35fbfaddd3befa1

netscape.netware.txt

Change Mirror Download
Netscape Enterprise Server for NetWare Virtual Directory Vulnerability

Advisory Code: VIGILANTE-2000001

Release Date:
June 26, 2000

Systems Affected:
NetWare 5.1 prior to support pack 1
NetWare 5.0 - all support packs
Possibly older versions of NetWare as well (not tested)

THE PROBLEM
By issuing a malformed URL it is possible to cause a denial of service
situation and/or execute arbitrary code on the server with the privileges of
the web server. Here is a snippet from the log file to
illustrate.

Server XXXXXXXX halted XXXXX, XX March 2000 13.13.00
Abend 8 on P00: Server-5.00d: Page Fault Processor Exception (Error code
00000000)

Registers:
CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0010 SS = 0010
EAX = 00000000 EBX = 61616161 ECX = 00000000 EDX = D6C175C0
ESI = 61616161 EDI = 61616161 EBP = 61616161 ESP = D48F2F94
EIP = 61616161 FLAGS = 00010286
Address (61616161) exceeds valid memory limit
EIP in UNKNOWN memory area
Access Location: 0x61616161

Running process: NS Web Thread 7 Process
Created by: NetWare Application
Thread Owned by NLM: NSHTTPD.NLM
Stack pointer: D48F31B4
OS Stack limit: D48E3480
Scheduling priority: 67371008
Wait state: 5050090 (Wait for interrupt)
Stack: --61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?
--61616161 ?

The immediate effect of the problem if abused as denial of service is that
all "executables" cease to respond, that is, /cgi-bin/, /lcgi/, /netbasic/,
/perl/ etc., but as you can see, the EIP has been overwritten as well as the
entire stack.

Vendor Status:
Informed around the beginning of April this year

Fix:
Novell has released a patch included in NetWare 5.1 Support Pack 1.
Export(56 bit) URL:
http://support.novell.com/cgi-bin/search/tidfinder.cgi?2956734
Domestic(128 bit) URL:
http://support.novell.com/cgi-bin/search/tidfinder.cgi?2956733

Vendor URL: http://www.novell.com
Program URL: http://www.novell.com/products/netscape_servers/

Copyright VIGILANTe 2000-06-26

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: info@vigilante.com
http://www.vigilante.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close