what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mnoGoSearch0215.txt

mnoGoSearch0215.txt
Posted Feb 16, 2004
Authored by Frank Denis

mnoGoSearch versions 3.2.13-15 are vulnerable to a buffer overflow attack when a large document is indexed.

tags | advisory, overflow
SHA-256 | b81572f8e5896c50b3258ba30d2a396e68c049ce518ef8b86832bea9d0ef61b5

mnoGoSearch0215.txt

Change Mirror Download

Product : mnoGoSearch
Date : 02/15/2004
Author : Frank Denis <j@pureftpd.org>


------------------------[ Product description ]------------------------

From the web site :

mnoGoSearch (formerly known as UdmSearch) is a full-featured web search
engine software for intranet and internet servers.

mnoGoSearch for UNIX is a free software covered by the GNU General Public
License and mnoGoSearch for Windows is a commercial search software version.

Home page : http://www.mnogosearch.ru/


------------------------[ Vulnerability ]------------------------

Every document is stored in multiple parts according to its sections
(description, body, etc) in databases. And when the content has to be sent
to the client, UdmDocToTextBuf() concatenates those parts together and skips
metadata.

Unfortunately, that function lacks bounds checking and a buffer overflow
can be triggered by indexing a large enough document.


------------------------[ Details ]------------------------

From src/doc.c of the latest release (3.2.15) :

int UdmDocToTextBuf(UDM_DOCUMENT * Doc,char *textbuf,size_t len){
size_t i;
char *end;

textbuf[0]='\0';
udm_snprintf(textbuf, len, "<DOC");

end=textbuf+strlen(textbuf);
for(i=0;i<Doc->Sections.nvars;i++){
...
sprintf(end,"\t%s=\"%s\"",S->name,S->val);
end=end+strlen(end);
}
strcpy(end,">");
return UDM_OK;
}

'len' is fixed to 10K in searchd.c . S->val length depends on the length of
the original document and on the indexer settings (the sample configuration
file has low limits that work around the bug, though).

Exploitation should be easy, moreover textbuf points to the stack.


------------------------[ Affected versions ]------------------------

mnoGoSearch 3.2.15, 3.2.14 and 3.2.13 have been verified to be vulnerable,
previous versions may also be affected.


------------------------[ Workarounds ]------------------------

The max size of every section is configurable un the document sections of
the indexer.conf :

Section body 1 8192
Section title 2 128
Section meta.keywords 3 128
Section meta.description 4 128
...

Make sure that the last value of each section is below 10 kilobytes.

If you need to use a larger value (which can be handy for the body section
to get accurate extracts without using stored), the size of the buffer is
defined in src/searchd.c, in do_client(), around line 216. Change the
textbuf[] size to something that matches the maximum size of your sections.


------------------------[ Vendor status ]------------------------

Vendor was notified on Jan 8 with mails to devel@mnogosearch.org.
Other vulnerabilities were reported as well.
No answer was ever received and no fixed version seems to be available yet.


--
__ /*- Frank DENIS (Jedi/Sector One) <j at 42-Networks.Com> -*\ __
\ '/ <a href="http://www.PureFTPd.Org/"> Secure FTP Server </a> \' /
\/ <a href="http://www.Jedi.Claranet.Fr/"> Misc. free software </a> \/
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close