[NEWS] mnoGoSearch Found To Be Vulnerable to a Heap OverflowFrom: firstname.lastname@example.org
- Previous message: email@example.com: "[NT] NTFS and PGP Interact to Expose EFS Encrypted Data"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com Date: Sat, 11 May 2002 23:18:21 +0200 (CEST)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
mnoGoSearch Found To Be Vulnerable to a Heap Overflow
<http://www.mnogosearch.org/> mnoGoSearch is a full-featured SQL based
web search engine, a vulnerability in the product allows attackers to
cause the product to overflow one of its internal heap buffers, causing
the program to crash, possibly execute arbitrary code.
mnoGoSearch version 3.1.9 and prior
mnoGoSearch version 3.2.0
Whenever mnoGoSearch receives a too long query string (q var), search.cgi
segfaults (Example: http://127.0.0.1/cgi-bin/search.cgi?q=query). The bug
resides in a bad management of heap-allocated memory. The bug could be
abused by remote attackers to execute code with web server privileges.
Authors were contacted a month ago: they told notified that the CVS
version had been fixed. Currently you should disable search.cgi, or
alternatively use the patch attached to this advisory (for 3.1.19) or
install last CVS version.
--- src/search.c Tue Jun 26 10:55:17 2001
+++ src/search.c Wed May 8 15:17:12 2002
@@ -1403,6 +1403,13 @@
+ /* Really temporary security fix */
+ if(strlen(token) > 512)
+ printf("<html><body>Query string too long</body></html>\n");
+ /* q1-- */
The information has been provided by <mailto:firstname.lastname@example.org> qitest1.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.