[NEWS] Darwin Streaming Server Remote Denial of Service Vulnerability

From: SecuriTeam (support_at_securiteam.com)
Date: 02/24/04

  • Next message: SecuriTeam: "[NT] Apache for Cygwin Directory Traversal (%5C)"
    To: list@securiteam.com
    Date: 24 Feb 2004 10:10:35 +0200

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.

    - - - - - - - - -

      Darwin Streaming Server Remote Denial of Service Vulnerability


    Darwin Streaming Server is server technology allowing for the streaming of
    QuickTime data to clients across the Internet using the industry standard
    RTP and RTSP protocols. Exploitation of a flaw in Apple Computer Inc's
    Darwin Streaming Server allows unauthenticated remote attackers to prevent
    legitimate usage.


    Vulnerable Systems:
     * Darwin Streaming Server version 4.1.3

    The vulnerability specifically occurs upon parsing of DESCRIBE requests
    with specially crafted User-Agent fields. Making a request with a
    User-Agent field containing over 255 characters causes an assert error in
    CommonUtilitiesLib/StringFormatter.h line 97:

    virtual void BufferIsFull(char* /*inBuffer*/, UInt32/*inBufferLen*/)

    Successful exploitation disrupts further content streaming capabilities.

    Vendor Status:
    This is fixed in Security Update 2004-02-23 available for Mac OS X 10.3.2
    Server and Mac OS X 10.2.8 Server. The update and further information is
    available from Apple's Support site at: <http://www.apple.com/support/>

    CVE Information:
    The Common Vulnerabilities and Exposures (CVE) project has assigned the
    CAN-2004-0169 to this issue. This is a candidate for inclusion in the CVE
    list (http://cve.mitre.org), which standardizes names for security

    Disclosure timeline:
    December 8, 2003 - Exploit acquired by iDEFENSE
    January 29, 2004 - iDEFENSE clients notified
    January 29, 2004 - Initial vendor notification
    January 29, 2004 - Vendor response received
    February 23, 2004 - Coordinated public disclosure


    The information has been provided by
    <mailto:idlabs-advisories@idefense.com> iDEFENSE.

    The original article can be found at:
    <http://www.idefense.com/application/poi/display?id=75&type=vulnerabilities> http://www.idefense.com/application/poi/display?id=75&type=vulnerabilities.


    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

  • Next message: SecuriTeam: "[NT] Apache for Cygwin Directory Traversal (%5C)"