what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms-comsrvr.txt

ms-comsrvr.txt
Posted Jul 4, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's Commerce Server 2000 and 2002 contains several remotely exploitable buffer overruns in the Profile Service and a CGI executable that allows the execution of arbitrary commands.

tags | overflow, arbitrary, cgi
SHA-256 | 5f49c7b4916d833e0dce23ac8eb20f45b61dfa9a25d2ab7df12e6438d85ed78c

ms-comsrvr.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Microsoft Commerce Server 2000 & Commerce Server 2002
Systems Affected: WinNT, Win2K, XP
Severity: High Risk
Category: Buffer Overrun & Command Execution
Vendor URL: http://www.microsoft.com/
Authors: Mark Litchfield (mark@ngssoftware.com) & David Litchfield
(david@ngssoftware.com)
Advisory URL: http://www.ngssoftware.com/advisories/ms-comsrvr.txt
Date: 3rd July 2002
Advisory number: #NISR03062002
VNA Reference: http://www.ngssoftware.com/vna/ms-comsrvr.txt


Description
***********
Microsoft's Commerce Server 2000 and 2002 are web server products for
building e-commerce sites. These products provide tools and features that
simplify the development and deployment of e-commerce solutions and
analyzing site usage and performance. There are several remotely exploitable
buffer overruns in Commerce Server in disparate locations and a CGI
executable that allows the execution of arbitrary commands.


Details
*******
The Profile Service of Microsoft Commerce Server 2000 allows remote
attackers to cause the server to fail or run arbitrary attacker supplied
code in the security context of the Local SYSTEM account. Several areas in
this service contain vulnerable code.

The Office Web Components (OWC) package installer used by Microsoft Commerce
Server 2000 allows remote attackers to cause the process to run arbitray
code in the LocalSystem security context by via input to the OWC package
installer. By default users have to authenticate to access this executable
so the risk posed is less severe in nature.

Again, the Office Web Components (OWC) package installer for Microsoft
Commerce Server 2000 allows remote attackers to execute commands by passing
the commands as input to the OWC package installer with a '/C' option.


Fix Information
***************
NGSSoftware alerted Microsoft to these problems on the 6th March 2002. The
patches are available from:
Microsoft Commerce Server 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39591
Microsoft Commerce Server 2002:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39550

A check for these issues has been added to Typhon II, of which more
information is available from the NGSSite, http://www.ngssoftware.com.

Further Information
*******************

For further information about the scope and effects of buffer overflows,
please see

http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
http://www.ngssoftware.com/papers/ntbufferoverflow.html
http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
http://www.ngssoftware.com/papers/unicodebo.pdf









Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close