what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

def-2001-30.txt

def-2001-30.txt
Posted Oct 25, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-30 - Release 2.0.0.1.0 and below of Oracle9iAS Web Cache contains buffer overflow allowing remote code execution or denial of service. Four tcp ports are affected - 1100, 4000, 4001, and 4002.

tags | remote, web, denial of service, overflow, tcp, code execution
SHA-256 | f84e5fa56ac7f1defed18d7d99d77cc257d1afee8c87d4d53b68e58d7fa1eba8

def-2001-30.txt

Change Mirror Download
======================================================================
Defcom Labs Advisory def-2001-30

Oracle9iAS Web Cache/2.0.0.1.0 Multiple DoS and Buffer Overflow

Authors: George Hedfors <george.hedfors@defcom.com>
Andreas Junestam <andreas.junestam@defcom.com>
Release Date: 2001-10-18
======================================================================
------------------------=[Brief Description]=-------------------------
Release 2.0.0.1.0 and perhaps even previous releases, contain a URL
driven buffer overrun condition which either can cause process exiting,
process hanging or injection of malicious code.

------------------------=[Affected Systems]=--------------------------
Oracle9iAS Web Cache/2.0.0.1.0 on all supported platforms.

----------------------=[Detailed Description]=------------------------
A simple URL driven denial of service or buffer overflow condition
occurs when a very long text string is sent to the web service.
This occurs on all four web services that the Oracle9iAS Web Cache
software provides. The four services are by default run on: Port 1100 =
Incoming web cache proxy. Port 4000 = Administrative interface. Port
4001 = Web XML invalidation port. Port 4002 = Statistics port.

* Buffer overflow condition:
When sending a request containing / + 'A' x 3095 + 'N' x 4, the
process terminates with the with the following state dump:

<....snip>
State Dump for Thread Id 0x104

eax=00000c1d ebx=00000000 ecx=00000c1d edx=026f0041
esi=01baac86 edi=0040deb6
eip=4e4e4e4e esp=0632fe08 ebp=41414141 iopl=0
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000216
<snip....>


* Denial of service:
Upon sending a string longer then 3570 characters, the process
simply exists without stack dump:
'GET /<3571 x A> HTTP/1.0'

The following three denial of service attacks result in the process
hanging and the CPU usage of 100% and a reboot is required in order
to terminate the hanging processes.

- When sending a string containing approximately 3094 characters.

- When sending more aproximatly 4000 characters in the HTTP header.
User-Agent is one of the verified headers where this condition
exists.
'GET / HTTP/1.0'
'User-Agent: <4000 x A>'

- Sending the following request (this only affects the webcache
admin interface):
'GET /. HTTP/1.0'

---------------------------=[Workaround]=-----------------------------
Download patch from Oracle's support website, http://metalink.oracle.com

NT/WIN2K:
Patch number 2044682

SUN Sparc Solaris:
Patch number 2042106

HP-UX:
Patch number 2043908

Linux:
Patch number 2043924

Compaq Tru64 Unix:
Patch number 2043921

IBM AIX:
Patch number 2043917

-----------------------------=[Exploit]=------------------------------
For NT/WIN2K, see attached file, webcache.pl

-------------------------=[Vendor Response]=--------------------------
Vendor was notified on 2001-09-17. Patch is released.

======================================================================
This release was brought to you by Defcom Labs

labs@defcom.com labs.defcom.com
======================================================================

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close