exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

visnetic.dos.txt

visnetic.dos.txt
Posted Dec 25, 2002
Authored by Peter Kruse | Site krusesecurity.dk

The VisNetic WebSite Server for Windows v3.5.13.1 and below contains a remote denial of service vulnerability which can be exploited by sending a 5000 character URL.

tags | advisory, remote, denial of service
systems | windows
SHA-256 | 3c584629b51d943bbf04163d06512c711249ee635d947585e6b48ef586d7e361

visnetic.dos.txt

Change Mirror Download
Name:              VisNetic WebSite Denial of Service
Date: 12th of December 2002
Software affected: VisNetic WebSite 3.5.13.1
(prior versions are vulnerable)
Advisory: http://www.krusesecurity.dk/advisories/vis0102.txt
Risk: Medium


Legal Notice:

This Advisory is copyright by Peter Kruse. You may distribute
this unmodified.

Disclaimer:

The opinions expressed in this advisory are my own and not that
of any company. The usual standard disclaimer applies, especially
the fact that Peter Kruse or Kruse Security is not liable for
any damages caused by direct or indirect use of the information
or functionality provided by this advisory or program.

Vendor Description:

VisNetic Website, the first web server developed specifically for
Windows, can use almost any development platform, and includes
features that allow web developers to create powerful, flexible
web sites. VisNetic WebSite is a secure Windows-based web server
that supports multiple domains, and allows TLS/SSL secured
domains. This web server also includes support for a user
database that can restrict access to content, and is immune to
many of the security issues that may arise with other popular
web servers.

Problem:

During a trial installation of the Visnetic website package I
discovered a bug in the software that would crash the server on
handling special longsized URLs. The server is subject to a
Denial of Service attack. The weakness could allow a malicous
attacker to send an oversized packet to the server which will
effect a Denial of Service to the application.

Description:

The flaw can be exploited with the /OPTIONS. With a "OPTIONS
/AAAAAAA.HTML" approx. 5001 A's you can send data to the
webserver and crash the application. The server will crash with
an instruction (write) fault at 0x00417d54 pointing to
0x41414141 in the httpd32.exe application. This weakness has
been verified by testing against the latest website software from
Deerfield (v3.5.13.1).

It should be noted that an attack will still be caught in the log
file for inspection by a company attacked by this long URL.

Credit:

I would like to thank Deerfield for quick and very professional
handling of the reported issue. An update has been released and
can be downloaded from Deerfield's web site at:

http://www.deerfield.com/download/visnetic_website/

The update can also be downloaded from the Visnetic WebSite
administration console, support tab, check for updates (at the
bottom of the tab).

Kind regards

Peter Kruse
Kruse Security
http://www.krusesecurity.dk

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close