exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

defcom.websphere.txt

defcom.websphere.txt
Posted Jan 9, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-02 - IBM WebSphere 3.52 (IBM HTTP Server 1.3.12) for Windows NT has a memory leak which can be used as a remote denial of service attack. Workaround included.

tags | exploit, remote, web, denial of service, memory leak
systems | windows
SHA-256 | c30b6f1e3f9eb32c68a980352c0665fac96d69038b54eff6607fd86a46d507e7

defcom.websphere.txt

Change Mirror Download
======================================================================
Defcom Labs Advisory def-2001-02

IBM Websphere 3.52 Kernel Leak DoS

Author: Peter Gründl <peter.grundl@defcom.com>
Release Date: 2001-01-08
======================================================================
------------------------=[Brief Description]=-------------------------
The Apfa cache in the IBM HTTP Server, which Websphere is built on,
has problems handling certain types of URL requests. The result of
such a URL is a kernel leak, which will eventually end up consuming
all available kernel memory and rendering the host useless.

------------------------=[Affected Systems]=--------------------------
- IBM WebSphere 3.52 (IBM HTTP Server 1.3.12) for Windows NT

----------------------=[Detailed Description]=------------------------
Sending a continous stream of HTTP requests resulting in "bad request"
will cause a kernel leak in Windows NT. There are many ways to trigger
the bad request result that triggers the leak,

eg. GET / HTTP/1.0\r\nuser-agent: 20000xnull\r\n\r\n

---------------------------=[Workaround]=-----------------------------
Comment out the three lines beginning with "Apfa" in the httpd.conf
file (located in the conf directory in the web server folder).

-------------------------=[Vendor Response]=--------------------------
This issue was brought to the vendor's attention on the 8th of
December, 2000. A workaround was received from the vendor on the 5th
of January, 2001.

"This issue is caused by a problem in the AfpaCache module of the IBM
HTTP Server. The only workaround at this time is to disable the
AfpaCache. IBM Development is working on fixing this issue, but it is
not yet known when a fix will be available."

======================================================================
This release was brought to you by Defcom Labs

labs@defcom.com www.defcom.com
======================================================================



Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close