[NEWS] Buffer Overflow in Netware Web Server PERL Handler
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 23 Jul 2003 17:49:20 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
Beyond Security in Canada
Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
We welcome ISPs, system integrators and IT systems resellers
to promote the most advanced vulnerability assessment solutions today.
Contact us at 416-482-0038 or at email@example.com
- - - - - - - - -
Buffer Overflow in Netware Web Server PERL Handler
The Netware Enterprise Server does not perform proper bounds check on
requests passed to the PERL interpreter through the PERL virtual
directory. This results in a buffer overflow condition, when large
requests are sent to the PERL interpreter.
* Netware 5.1 SP6
* Netware 6
The issue can be triggered by requesting the PERL virtual directory
followed by a long string.
http://server/perl/aaaaaa...[Unspecified number of characters]
The vulnerability occurs in the CGI2PERL.NLM module.
A request as shown above will overrun the allocated buffer and overwrite
EIP, causing the server to ABEND and either suspend the process or restart
itself, thereby creating a Denial of Service situation.
Novell has made a patch for this issue:
The information has been provided by <mailto:firstname.lastname@example.org> Uffe
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.