what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iplanet.search.txt

iplanet.search.txt
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

The Sun iPlanet Web Server iWS 4.1 and 6.0 contains a remotely exploitable buffer overflow if the search feature is enabled.

tags | web, overflow
SHA-256 | 569fc6dbae95b454b1cb7139d2f9325513c3521f10923c0642d0afb59f288e67

iplanet.search.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: iPlanet Search Buffer Overflow
Systems: iWS 6.0 and iWS 4.1
Severity: High Risk (if Search enabled)
Category: Remote Buffer Overrun Vulnerability
Vendor URL: http://www.iplanet.com/
Author: David Litchfield (david@ngssoftware.com)
Advisory URL: http://www.ngssoftware.com/advisories/sun-iws.txt
Date: 9th July 2002
Advisory number: #NISR09072002A
VNA reference : http://www.nextgenss.com/vna/sun-iws.txt

Description
***********
iPlanet's Web Server, now owned and maintained by Sun Microsystems, has a
remotely exploitable buffer overrun vulnerability in the search component.


Details
*******
By default, the search capabilities of iPlanet's Web Server are turned off,
but if search has been enabled then the server is vulnerable to a remotely
exploitable buffer overrun. By supplying an overly long value for the
'NS-rel-doc-name' parameter a saved return address is overwritten on the
stack, giving control over the vulnerable process' execution. Any code
supplied will run in the security context of the account running the web
server. On Windows NT/2000, for example, this account is the local SYSTEM
account, by default, so any code will run uninhibited.


Fix Information
***************
NGSSoftware alerted Sun to this problem on the 25th of April 2002 and were
informed that Sun wanted to address this in the next service pack, despite
NGSSoftware's recommedation that a hotfix should be released as this is a
remotely exploitable issue. This aside the service pack has been released.

Users of iPlanet Web Server 6 should install Service Pack 3.
Users of iPlanet Web Server 4.1 should install Service Pack 10.

A check for this vulnerability has been added to Typhon II, NGSSoftware's
vulnerability assessment scanner, of which, more information is available
from the NGSSite, http://www.ngssoftware.com/ .







Login or Register to add favorites

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close