[UNIX] BOOZT! Administration CGI Vulnerable to Buffer OverflowFrom: firstname.lastname@example.org
- Previous message: email@example.com: "[UNIX] Multiple pwck/grpck Privilege Elevation Vulnerabilities"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com Date: Tue, 8 Jan 2002 21:08:00 +0100 (CET)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
BOOZT! Administration CGI Vulnerable to Buffer Overflow
<http://www.boozt.com/> BOOZT! is a banner management software for Linux
servers. A security vulnerability in the product allows remote attackers
to execute arbitrary code, by exploiting a buffer overflow vulnerability
in the CGI.
Here is a reproduction of the bug:
Fill the "Name Field" with enough A's (over 770 A's) and press "Create New
Banner". You should see the following:
Internal Server Error
The server encountered an internal error or mis-configuration and was
unable to complete your request.
Let us see what happened in error_log:
[Tue Feb 5 17:13:52 2002] [error] [client 127.0.0.1] Premature end of
script headers: /usr/local/apache/cgi-bin/boozt/admin/index.cgi
Now see what the code for the AdministrationBanners function
(src/admin/banners.c) looks like:
if ((pomus=(char *)GetFromCgi("name"))==NULL) strcpy(name,"");
There is no boundary checking in GetFromCgi:
#define GetFromCgi(name) cgiParam(name)
const char *cgiParam(const char *name)
const char *cgiPosParam(CgiPos *where)
[ ... code to walk over the linked list ... ]
This way we can write custom shellcode beyond the boundaries of the "name"
variable, getting a shell with HTTPd privileges.
The information has been provided by <mailto:firstname.lastname@example.org> Rafael
San Miguel Carrasco.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.