exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Atstake Security Advisory 04-04-22.1

Atstake Security Advisory 04-04-22.1
Posted Apr 24, 2004
Authored by Atstake, Jeremy Jethro | Site atstake.com

Atstake Security Advisory A042204-1 - The SiteMinder Affiliate Agent plugin version 4.x is susceptible to a remotely exploitable heap overflow when the SMPROFILE cookie is passed a large value. This affect the Solaris, Windows, and HP-UX platforms.

tags | advisory, overflow
systems | windows, solaris, hpux
advisories | CVE-2004-0425
SHA-256 | 147240362c1334eca1c5fd7b59f02a967e85d03c2689319c88c06052f2ca65cf

Atstake Security Advisory 04-04-22.1

Change Mirror Download

Hash: SHA1

@stake, Inc.

Security Advisory

Advisory Name: Netegrity SiteMinder Affiliate Agent Cookie
Release Date: 04/22/2004
Application: SiteMinder Affiliate Agent 4.x
Platform: Solaris, Windows, HP-UX
Severity: A remote attacker can execute arbitrary commands
Author: Jeremy Jethro <jjethro@si.rr.com>
Vendor Status: Vendor has patch available
CVE Candidate: CAN-2004-0425 SiteMinder Affiliate Agent Cookie
Reference: www.atstake.com/research/advisories/2004/a042204-1.txt


The SiteMinder Affiliate Agent is a plugin that provides a connection
from a main portal to an affiliate site without requiring a user to
re-identify or provide additional information about them. The
affiliate site can determine that the user has been registered at the
main portal, and optionally, that the user has an active SiteMinder


The SMPROFILE cookie is used by the affiliate agent to determine if
the user has been registered to the main portal. A remotely
exploitable heap overflow can be triggered by passing a large value
to the SMPROFILE cookie.

A Nessus (NASL) script, siteminder_aa.nasl, which can be used to
scan for vulnerable servers, will be released after a 30 day delay.

Web servers that use the vulnerable SiteMinder plugin will quit
responding to requests when the NASL script is executed.

Vendor Response:

The handling of HTTP cookies has been modified to correctly process
cookies of all sizes.

Please download and install the following package to apply the fix:

Web Agent 4QMR6 HF-016

The package is available at https://support.netegrity.com

Please contact Netegrity Support for more information.

Toll-free Phone Number (U.S and Canada only):
(877) 748-3646 (or 877-SITEMINDER)
International Phone Number:
+1 (781) 663-7250 or +60 3 2055 3333

Notification Timeline:

4/07/2004 Vendor notified of issue
4/08/2004 Vendor confirms notification
4/14/2004 Vendor responds that they are fixing issue
4/21/2004 Vendor informs us that they have a patch available
4/22/2004 Advisory released


Install the vendor supplied update.

Install an application level firewall that has cookie size
filtering and restrict cookie sizes to less that 1024 bytes. This
may effect other applications.

Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following names to these issues. These are candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.

CAN-2004-0425 SiteMinder Affiliate Agent Cookie Overflow

Open Source Vulnerability Database Project (OSVDB) Information:


@stake Vulnerability Reporting Policy:

@stake Advisory Archive:

PGP Key:

Copyright 2004 @stake, Inc. All rights reserved.

Version: PGP 8.0


Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By