[11867] in bugtraq
Accept overflow on Netscape Enterprise Server 3.6 SP2
daemon@ATHENA.MIT.EDU (Nobuo Miwa)
Mon Sep 13 02:00:59 1999
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <199909130017.IGC05202.XOJBN-@lac.co.jp>
Date:         Mon, 13 Sep 1999 00:17:46 +0900
Reply-To: Nobuo Miwa <n-miwa@LAC.CO.JP>
From: Nobuo Miwa <n-miwa@LAC.CO.JP>
X-To:         Bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
Hi,
I found a vulnerability in "Enterprise 3.6 SP 2 SSL Handshake fix"..
I sent a malformed URL to the server and its service was dead.
Its URL is following...
  GET / HTTP/1.0
  Accept: aaaaaaaaaaaaaa...2000byte/gif
Ofcourse you must be able to execute small code you like with
"long Accept" command(just like htr problem on IIS).
I've reported this to Netscape on 31st Aug. They've just
finished making the patch(maybe SP3). It must be released soon.
I'm gonna post this to BUGTRAQ after they release the patch, but
someone posted it to some other mailing lists. So I decided
to post it to here today.
Thanks,
Nobuo Miwa(Moderator of BUGTRAQ-JP)