BugTraq
Tornado www-server v1.2: directory traversal, buffer overflow May 29 2003 11:09PM
D4rkGr3y (grey_1999 mail ru) (1 replies)
Re: Tornado www-server v1.2: directory traversal, buffer overflow Jun 02 2003 07:40AM
Berend-Jan Wever (SkyLined edup tudelft nl)
I've done a quick debugging session: The overflow does not seem exploitable
other then a DoS.
What happens is that there is not enough heap to hold the long strings so it
writes past the heap to a location where no memory is allocated. This will
cause an unhandled exception.

Kind regards,

Berend-Jan Wever.

----- Original Message -----
From: "D4rkGr3y" <grey_1999 (at) mail (dot) ru [email concealed]>
To: <bugtraq (at) security.nnov (dot) ru [email concealed]>; <bugtraq (at) securityfocus (dot) com [email concealed]>
Sent: Friday, May 30, 2003 1:09
Subject: Tornado www-server v1.2: directory traversal, buffer overflow
<snip>
> This server is one BiG problem. IMHO is most dangerous server.
> Main bug in DNA ;D Attacker may see any files in system (but
> only if he know path and filename), may crash server (and exec
> malicious code) by sending long http request. Examples:
>
> www.server.com/../existing_file <-file be showed
>
> www.server.com/aa[more than 471 chars]
> | |
> #--------------------------------------------------------------#
> | Exploit: |
> ~~~~~~~~
>
> Naah, its not interesting. Lets authors code something better.
<snip>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus