exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

steelarrow.txt

steelarrow.txt
Posted Aug 21, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory NISR19082002B - The Tomahawk SteelArrow web application server v4.1 and below for Windows NT and 2k contains three buffer overflows which allow the remote execution of code. Fix available here.

tags | remote, web, overflow
systems | windows
SHA-256 | 4a8bff199da6f100e224f72780c912d5fb4b0f765ed077517469b6ea5326ca8a

steelarrow.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Multiple Remote Buffer Overruns TOMAHAWKS' STEELARROW
Systems Affected: WinNT, Win2K (Not tested on other platforms)
Severity: High Risk
Category: Remote System Buffer Overrun
Vendor URL: http://www.tomahawk.com
Author: Mark Litchfield (mark@ngssoftware.com)
Date: 19th August 2002
Advisory number: #NISR19082002B


Description
***********

SteelArrow is an easy to use Web Application Server offering the latest in
Internet connectivity and dynamic content development. SteelArrow offers
developers full web application development functionality and fully tested
run time reliability. Steelarrow operates as an extension (on WinNT/2K) to
Microsoft IIS, Apache and Netscape Enterprise servers.

Details
*******

Buffer Overrun 1)

SteelArrow tracks user sessions with cookies in the form of
UserIdent=XXXXXXXXXXXX. By supplying an overly long vlaue in the Cookie
HTTP header a buffer overflow occurs in the Steelarrow Service
(Steelarrow.exe) overwriting a saved return address on the stack.
Steelarrow, by default on Win2k/WinNT is installed as a system service. Any
arbitary code executed using this vulnerability will run with system
privileges.

Buffer Overrun 2)

By making an overly long request for a .aro (extension used by Steelarrow)
file, an access violation occurs in DLLHOST.EXE (Steelarrow.dll), again
overwriting a saved return address on the stack. Any code will execute in
the security context of the IWAM account.

Buffer Overrun 3)

It's that Chunked Transfer-Encoding issue again. By making a request for a
.aro file an including a specific Transfer-Encoding: Chunked request within
the HTTP request header fields and access violation occurs in DLLHOST.EXE
due to a heap overflow. Again any arbitary code execution will run in the
context of the IWAM account.

Fix Information
***************
NGSSoftware alerted the vendor to these buffer overflow issues on the 1st
2nd and 3rd of April 2002. A fix is available from
http://www.steelarrow.com

A check for these issues has been added to Typhon II, of which more
information is available from the
NGSSoftware website, http://www.ngssoftware.com.

Further Information
*******************

For further information about the scope and effects of buffer overflows,
please see

http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
http://www.ngssoftware.com/papers/ntbufferoverflow.html
http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
http://www.ngssoftware.com/papers/unicodebo.pdf









Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close