LibHTTPD POST远程缓冲区溢出漏洞

漏洞信息详情

LibHTTPD POST远程缓冲区溢出漏洞

漏洞简介

LibHTTPD是一款用于嵌入设备的小型WEB服务程序。
LibHTTPD对超长POST请求处理不正确,远程攻击者可以利用这个漏洞对LibHTTPD服务程序进行缓冲区溢出攻击,以WEB进程在系统上执行任意指令。
检查libhttpd.a库中的\’\’api.c\’\’源代码,发现860行的httpdProcessRequest()函数对用户提交的输入缺少正确检查,提交超长POST请求可导致不经过充分边界检查而直接进行拷贝操作,发生缓冲区溢出,精心构建提交请求数据可能以WEB进程权限在系统上执行任意指令。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* “dong-h0un U” <xploit@hackermail.com>提供了如下第三方补丁:

=== api.patch ===

— api.c Sat Nov 9 20:06:30 2002

+++ api.patch.c Sat Nov 9 20:05:33 2002

@@ -867,7 +867,7 @@

httpContent *entry;

server->response.responseLength = 0;

– strcpy(dirName, httpdRequestPath(server));

+ strncpy(dirName, httpdRequestPath(server), HTTP_MAX_URL);

cp = rindex(dirName, ‘/’);

if (cp == NULL)

{
厂商补丁:
Hughes Technologies
——————-
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Hughes Technologies libHTTPD 1.2:

INetCop Security Patch libhttpd.patch

http://downloads.securityfocus.com/vulnerabilities/patches/libhttpd.patch” target=”_blank”>
http://downloads.securityfocus.com/vulnerabilities/patches/libhttpd.patch

Hughes Technologies Upgrade libHTTPD v1.3

http://www.hughes.com.au/products/libhttpd/libhttpd-1.3.tar.gz” target=”_blank”>
http://www.hughes.com.au/products/libhttpd/libhttpd-1.3.tar.gz

参考网址

来源: BID
名称: 6172
链接:http://www.securityfocus.com/bid/6172

来源: BUGTRAQ
名称: 20021124 LibHTTPD Vulnerability and fix
链接:http://archives.neohapsis.com/archives/bugtraq/2002-11/0305.html

来源: www.securiteam.com
链接:http://www.securiteam.com/unixfocus/6H00I2060I.html

来源: XF
名称: libhttpd-httpdprocessrequest-bo(10615)
链接:http://www.iss.net/security_center/static/10615.php

来源: BUGTRAQ
名称: 20021113 Remote Buffer Overflow vulnerability in Lib HTTPd.
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=103720432411860&w=2

来源:NSFOCUS
名称:3920
链接:http://www.nsfocus.net/vulndb/3920

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享