[10578] in bugtraq

home help back first fref pref prev next nref lref last post

Denial of Service in Counter.exe version 2.70

daemon@ATHENA.MIT.EDU (Mnemonix)
Wed May 19 15:05:08 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <000f01bea192$f48d2320$6ad193c3@pluto>
Date: 	Wed, 19 May 1999 02:00:11 +0100
Reply-To: Mnemonix <mnemonix@GLOBALNET.CO.UK>
From: Mnemonix <mnemonix@GLOBALNET.CO.UK>
X-To:         ntbugtraq@listserv.ntbugtraq.com
To: BUGTRAQ@NETSPACE.ORG

A denial of service exists in counter.exe version 2.70, a fairly popular
webhit counter used on the Win32 platform with web servers such as IIS and
WebSite Pro. There are two different bugs:

1) When someone requests :
http://no-such-server-really/scripts/counter.exe?%0A this will create an
entry in counter.log of a blank line then a ",1" . If the person then
refreshes their browser and requests it again you get an Access Violation in
counter.exe - the instruction at 0x00414c0a referenced memory at 0x00000000.

2) When someone requests:
http://no-such-server-really/scripts/counter.exe?AAAAAover-2200-As you get a
similar problem - though not a buffer overrun.

Whilst in a state of "hanging" all other vaild requests for counter are
queued and not dealt with until someone goes to the console and okays the AV
messages. Added to this memory can be consumed if the page is continuosly
requested.

I mailed the author twice about this but as I have received no response I
have nothing left to do but send this on.
Cheers,
David Litchfield
http://www.infowar.co.uk/mnemonix
http://www.arca.com

home help back first fref pref prev next nref lref last post