[17271] in bugtraq

home help back first fref pref prev next nref lref last post

Re: IIS %c1%1c remote command execution

daemon@ATHENA.MIT.EDU (rain forest puppy)
Thu Oct 19 14:34:11 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.10010181821070.8710-100000@eight.wiretrip.net>
Date:         Wed, 18 Oct 2000 18:23:45 -0500
Reply-To: rain forest puppy <rfp@WIRETRIP.NET>
From: rain forest puppy <rfp@WIRETRIP.NET>
X-To:         Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <tglmvmz3ek.fsf@mercury.rus.uni-stuttgart.de>

> This is one of the vulnerabilities Bruce Schneier warned of in one of
> the past CRYPTO-GRAM isssues.  The problem isn't the wrong time of
> path checking alone, but as well a poorly implemented UTF-8 decoder.
> RFC 2279 explicitly says that overlong sequences such as 0xC0 0xAF are
> invalid.

Yep, I agree, and that's because...

> Markus Kuhn's UTF-8 stress test file contains some tests covering such
> problems.  It's available at:
>         http://www.cl.cam.ac.uk/~mgk25/ucs/examples/UTF-8-test.txt

Markus' FAQ is what helped me to understand what's going on.  It
definately is a good writeup.

I also reviewed a writeup located at:

	http://czyborra.com/utf/

As equally informative.

As UTF support creeps into various places, this may become a more
prominent problem.  I already forsee uses in virus scanner and IDS
evasion.

- rfp

home help back first fref pref prev next nref lref last post