Savant Webserver Buffer Overflow Vulnerability

From: Tamer Sahin (tamer@ONAR.COM.TR)
Date: 01/09/02


Date:         Wed, 9 Jan 2002 12:46:23 +0200
From: Tamer Sahin <tamer@ONAR.COM.TR>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Savant Webserver Buffer Overflow Vulnerability

Type:
DoS, crashes Daemon

Release Date:
January 5, 2002

Product / Vendor:
Savant is a freeware open source web server that runs on Windows 95,
98, ME, NT, and 2000, turning any desktop computer into a powerful
web server. Designed to be fast, secure, and efficient, Savant is
the choice of thousands of professional and amateur webmasters
worldwide.

http://savant.sourceforge.net

Summary:
Server crashes after sending very long parameter a few times.

http://host/cgi-bin/cgi-test.pl.......................................
......................................................................
......................................................................
...........................................................

The instruction at "0x002e2e3d" referenced memory at "0xac40303c".
The memory could not be "written".

Log:
Error File: <error.txt>
- - - -
- - - -
- - - -
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: TCP buffer overflow
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process
Error: Failure to create CGI Process

Tested:
Windows 2000 / Savant 3.0

Vulnerable:
Savant 3.0 (And may be other)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQA/AwUBPDwffruLpFMrXtywEQIx1ACfV825B/PKvSd1fEljO5KkJ7qvj7AAnR78
uruq8CAvZFqRUhGsywZPJ+oq
=zBH+
-----END PGP SIGNATURE-----

============================================================================
Delivery co-sponsored by VeriSign - The Internet Trust Company
============================================================================
FREE E-COMMERCE SECURITY INFRASTRUCTURE GUIDE
When building an e-commerce site, you want to start with a strong, secure
foundation. Learn how with VeriSign's FREE White Paper, "Building an
E-Commerce Trust Infrastructure." See how you can authenticate your site to
customers, use 128-Bit SSL encryption to secure your web servers, and accept
secure payments online. Click here:
http://www.verisign.com/cgi-bin/go.cgi?a=n116965650045000
============================================================================



Relevant Pages

  • Savant Webserver Buffer Overflow Vulnerability
    ... Savant Webserver Buffer Overflow Vulnerability ... Error: TCP buffer overflow ... Failure to create CGI Process ...
    (Bugtraq)
  • [NT] Savant Webserver Buffer Overflow Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Error: TCP buffer overflow ... Failure to create CGI Process ...
    (Securiteam)
  • Re: DATETIME like YYYYMMDDHHMMSS
    ... since I do not believe that this is the only way of failure ... > waiting there. ... OK, educate me, where are the other oppotunites for buffer overflow? ...
    (comp.lang.cpp)