[NEWS] Buffer Overflow in Netware Web Server PERL Handler

From: SecuriTeam (support_at_securiteam.com)
Date: 07/23/03

  • Next message: SecuriTeam: "[UNIX] University of Minnesota Gopherd do_command Buffer Overflow Vulnerability"
    To: list@securiteam.com
    Date: 23 Jul 2003 17:49:20 +0200

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    Beyond Security in Canada

    Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
    We welcome ISPs, system integrators and IT systems resellers
    to promote the most advanced vulnerability assessment solutions today.

    Contact us at 416-482-0038 or at canadasales@beyondsecurity.com

    - - - - - - - - -

      Buffer Overflow in Netware Web Server PERL Handler


    The Netware Enterprise Server does not perform proper bounds check on
    requests passed to the PERL interpreter through the PERL virtual
    directory. This results in a buffer overflow condition, when large
    requests are sent to the PERL interpreter.


    Vulnerable systems:
     * Netware 5.1 SP6
     * Netware 6

    The issue can be triggered by requesting the PERL virtual directory
    followed by a long string.
    http://server/perl/aaaaaa...[Unspecified number of characters]

    The vulnerability occurs in the CGI2PERL.NLM module.

    A request as shown above will overrun the allocated buffer and overwrite
    EIP, causing the server to ABEND and either suspend the process or restart
    itself, thereby creating a Denial of Service situation.

    Corrective actions:
    Novell has made a patch for this issue:


    The original advisory can be downloaded from:

    The information has been provided by <mailto:uni@protego.dk> Uffe


    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

  • Next message: SecuriTeam: "[UNIX] University of Minnesota Gopherd do_command Buffer Overflow Vulnerability"