| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-Id: <Pine.BSO.4.21.9912311130520.16621-100000@www.whitehats.com> Date: Fri, 31 Dec 1999 11:51:44 -0800 Reply-To: Max Vision <vision@WHITEHATS.COM> From: Max Vision <vision@WHITEHATS.COM> X-To: BUGTRAQ@SECURITYFOCUS.COM To: BUGTRAQ@SECURITYFOCUS.COM In-Reply-To: <19991231112549.3919.qmail@nwcst322.netaddress.usa.net> Hi, This attack can now be detected by the following IDS signatures: http://dev.whitehats.com/cgi/test/new.pl/Show?_id=web-netscape-overflow-unixware http://dev.whitehats.com/cgi/test/new.pl/Show?_id=outgoing_xterm http://dev.whitehats.com/cgi/test/new.pl/Show?_id=nops-x86 These signatures are also available as part of http://dev.whitehats.com/ids/vision.conf Note that each record includes packet traces from usage of an actual exploit attempt. Max Vision http://whitehats.com/ <- free tools, forums, IDS database http://maxvision.net/ On Fri, 31 Dec 1999, Brock Tellier wrote: > OVERVIEW > A vulnerability in Netscape FastTrack 2.01a will allow any remote user to > execute commands as the user running the httpd daemon (probably nobody). This > service is running by default on a standard UnixWare 7.1 installation. > > /** uwhelp.c - remote exploit for UnixWare's Netscape FastTrack > ** 2.01a scohelp http service > **
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |