what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NGSTango.txt

NGSTango.txt
Posted Jul 19, 2003
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR18072003 - The WiTango application server is vulnerable to a remote system buffer overrun. By passing a long cookie to Witango_UserReference, a remote attacker can overwrite the saved return address on the stack. As Witango is installed as LocalSystem, any arbitrary code execution will run as SYSTEM.

tags | advisory, remote, overflow, arbitrary, code execution
SHA-256 | 059de172eff375a42985f940d179b214a19f158095cef3e1970170c2b0b3407e

NGSTango.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: WiTango Application Server & Tango 2000
Systems Affected: Windows
Severity: Critical Risk
Category: Remote System Buffer Overrun
Vendor URL: http://www.witango.com
Author: Mark Litchfield (mark@ngssoftware.com)
Date: 18th July 2003
Advisory number: #NISR18072003


Description
***********

As detailed on http://www.witango.com - Witango can provide your Web
Application with a solid application framework, a simple interface for both
the production and ongoing maintenance of complex application logic, a
variety of mechanisms to integrate to non-web interfaces, and a wide range
of database connectivity options. The Witango product suite provides a
comprehensive Integrated Development Environment (IDE) to enable application
developers to rapidly generate XML files which can then be deployed to a
wide range of operating systems. Witango is a fast to learn, easy to use,
scalable solution for the Professional Web Application Developer.

Details
*******

By passing a long cookie to Witango_UserReference we overwrite the saved
return address on the stack. As Witango is installed as LocalSystem, any
arbitrary code execution will run as SYSTEM

GET /ngssoftware.tml HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword,
application/x-shockwave-flash, */*
Accept-Language: en-gb
User-Agent: My Browser
Host: ngssoftware.com
Connection: Keep-Alive
Cookie: Witango_UserReference= parameter length 2864

I have been asked by Phil Wade of Witango to mention the following: "We also
did some tests on older versions of the server and found the vulnerability
also exists in the previous version of the server which was known as Tango
2000. Can you also mention that Tango 2000 is also vulnerable and should be
upgraded to Witango 5.0.1.062 especially if the Tango 2000 server is
accessible from the internet"

Fix Information
***************

NGSSoftware alerted Witango to this issue on 13th July 2003. I would like
to mention, that Witango acted very quickly in producing a patch helping to
ensure that their clients are protected. Please visit
http://www.witango.com to download the latest build.

A check for this issue has been added to Typhon, a comprehensive automated
vulnerability assessment tool of which more information is available from
the
NGSSite http://www.ngssoftware.com

About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware have
offices in London, and St Andrews Scotland. NGSSoftware's sister company
NGSConsulting, offers best of breed security consulting services,
specialising in application, host and network security assessments.

http://www.ngssoftware.com
http://www.ngsconsulting.com

Telephone: +44 208 40 100 70
Fax: +44 208 401 0076

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close