[23835] in bugtraq
Pi3Web Webserver v2.0 Buffer Overflow Vulnerability
daemon@ATHENA.MIT.EDU (Tamer Sahin)
Mon Jan 14 16:25:01 2002
Message-ID: <000b01c19c86$1f3c97e0$3bc283d9@ts>
Reply-To: "Tamer Sahin" <ts@securityoffice.net>
From: "Tamer Sahin" <ts@securityoffice.net>
To: <bugtraq@securityfocus.com>
Date: Mon, 14 Jan 2002 01:00:39 +0200
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Pi3Web Webserver v2.0 Buffer Overflow Vulnerability
Type:
DoS, crashes Daemon
Release Date:
January 14, 2002
Product / Vendor:
Pi3Web is a free, multithreaded, highly configurable and extensible
HTTP server and development environment for cross platform internet
server development and deployment.
http://pi3web.sourceforge.net
Summary:
Server crashes after sending very long cgi parameter a few times.
http://host/cgi-bin/hello.exe.....<224 char>......
The instruction at "0x77fcc1df" referenced memory at "0x009946c0".
The memory could not be "read".
Tested:
Windows 2000 / PiWeb v2.0
Vulnerable:
Pi3Web v2.0 (And may be other)
Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.
Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net
Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1
iQA/AwUBPEIRlruLpFMrXtywEQLrmwCeKWYcTxIlPERxzY+jA8m3v/boFXAAn1En
AuKA4zylpjqVVkGZdHiuILSt
=zVHB
-----END PGP SIGNATURE-----