[23915] in bugtraq
Re: Pi3Web Webserver v2.0 Buffer Overflow Vulnerability
daemon@ATHENA.MIT.EDU (Holger Zimmermann)
Mon Jan 21 15:36:37 2002
Date: 21 Jan 2002 19:08:32 -0000
Message-ID: <20020121190832.5362.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Holger Zimmermann <zimpel@users.sourceforge.net>
To: bugtraq@securityfocus.com
In-Reply-To: <000b01c19c86$1f3c97e0$3bc283d9@ts>
>Received: (qmail 17088 invoked from network); 14 Jan 2002 17:51:37 -0000
>Received: from outgoing2.securityfocus.com (HELO outgoing.securityfocus.com)
(66.38.151.26)
> by mail.securityfocus.com with SMTP; 14 Jan 2002 17:51:37 -0000
>Received: from lists.securityfocus.com (lists.securityfocus.com [66.38.151.19])
> by outgoing.securityfocus.com (Postfix) with QMQP
> id 011858F2FE; Mon, 14 Jan 2002 09:59:27 -0700 (MST)
>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-help@securityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
>Delivered-To: mailing list bugtraq@securityfocus.com
>Delivered-To: moderator for bugtraq@securityfocus.com
>Received: (qmail 11602 invoked from network); 13 Jan 2002 23:05:57 -0000
>Message-ID: <000b01c19c86$1f3c97e0$3bc283d9@ts>
>Repl
Hi,
I tried to figure out this issue, which was originally reported in the bugtraq
mailing list http://www.securityfocus.com/archive/1/250126 a few days ago and
found out the following:
There's really a problem with Pi3Web 2.0 CGI handler for physical paths, which
are exactly MAX_PATH (260) bytes long and end with illegal (series of) dot(s).
The problem does exist due to a specific behaviour of the Windows API, which
isn't handled correctly and will crash the server reproducible.
- The problem is limited to Pi3Web 2.0 beta 1&2 on Win32.
- Linux and Solaris versions aren't affected at all.
- Older versions of Pi3Web aren't affected.
- Configurations without CGI aren't affected.
The problem could be reproduced by using the test case described
in the original report. May be you've to vary the number of dots a bit
(increase and/or decrease) dependant on the length of the physical path.
A patch fixing the problem is available at sourceforge from now:
http://sourceforge.net/tracker/index.php?func=detail&aid=505583&group_id=17753&ati
d=317753
This .ZIP file contains 2 DLL's, which must be replaced in Pi3Web/bin.
Don't forget to stop Pi3Web before you apply the patch and restart the
server afterwards.
A configuration based workaround is also possible by addition of the following
line in object Scripts, e.g. in Pi3Web/Conf/Config.pi3:
<Object>
Name Scripts
Class FlexibleHandlerClass
Condition "&cmp(&dblookup(response,string,ObjectMap),Scripts)"
# line added to check for script names ending on '.'
CheckPath Condition="&regexp(*.,$z)" StatusCode StatusCode="404"
...
Please report, if the problem could be reproduced before you applied the patch and
if it was safely solved afterwards.
--
regards
Holger Zimmermann