[23835] in bugtraq

home help back first fref pref prev next nref lref last post

Pi3Web Webserver v2.0 Buffer Overflow Vulnerability

daemon@ATHENA.MIT.EDU (Tamer Sahin)
Mon Jan 14 16:25:01 2002

Message-ID: <000b01c19c86$1f3c97e0$3bc283d9@ts>
Reply-To: "Tamer Sahin" <ts@securityoffice.net>
From: "Tamer Sahin" <ts@securityoffice.net>
To: <bugtraq@securityfocus.com>
Date: Mon, 14 Jan 2002 01:00:39 +0200
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Pi3Web Webserver v2.0 Buffer Overflow Vulnerability

Type:
DoS, crashes Daemon

Release Date:
January 14, 2002

Product / Vendor:
Pi3Web is a free, multithreaded, highly configurable and extensible
HTTP server and development environment for cross platform internet
server development and deployment. 

http://pi3web.sourceforge.net

Summary:
Server crashes after sending very long cgi parameter a few times.

http://host/cgi-bin/hello.exe.....<224 char>......

The instruction at "0x77fcc1df" referenced memory at "0x009946c0".
The memory could not be "read".

Tested:
Windows 2000 / PiWeb v2.0

Vulnerable:
Pi3Web v2.0 (And may be other)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQA/AwUBPEIRlruLpFMrXtywEQLrmwCeKWYcTxIlPERxzY+jA8m3v/boFXAAn1En
AuKA4zylpjqVVkGZdHiuILSt
=zVHB
-----END PGP SIGNATURE-----





home help back first fref pref prev next nref lref last post