[25850] in bugtraq

home help back first fref pref prev next nref lref last post

4D 6.7 DOS and Buffer Overflow Vulnerability

daemon@ATHENA.MIT.EDU (Alfred Goldberg)
Tue Jun 18 15:03:38 2002

From: "Alfred Goldberg" <agoldberg@absoluteitsolutions.com>
To: <bugtraq@securityfocus.com>
Date: Tue, 18 Jun 2002 12:59:54 -0400
Message-ID: <LEEELBOCGJOJKEJJHHKCCEPKCFAA.agoldberg@absoluteitsolutions.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Vulnerability Summary
---------------------
Problem: 	The 4D 6.7 webserver has a buffer overflow condition.

Threat:	An attacker could make the webserver crash and possibly execute
arbitrary code.

Affected Software:	4D Webserver version 6.7.3 verified.

Platform:	 Windows verified.

Solution:	Update to the version mentioned below.


Vulnerability Description
-------------------------
4D is unable to handle long HTTP requests. The result is a termination of
the 4D application as the buffer is overflown.

Solution
-------
4D 6.8 seems to of addressed this problem.

Additional Information
----------------------
4D was contacted 20020606 but returned no reply.

This vulnerability was found and researched by
Dumitru Vlad


home help back first fref pref prev next nref lref last post