漏洞信息详情
Shaun2k2 Palmhttpd Server远程拒绝服务攻击漏洞
- CNNVD编号:CNNVD-200411-148
- 危害等级: 中危
![图片[1]-Shaun2k2 Palmhttpd Server远程拒绝服务攻击漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-17/30f462579bec41fc25e0b1d57503e6d6.png)
- CVE编号:
CVE-2004-0264
- 漏洞类型:
缓冲区溢出
- 发布时间:
2004-02-09
- 威胁类型:
远程
- 更新时间:
2006-08-31
- 厂 商:
jim_rees - 漏洞来源:
shaun2k2※ shaunige… -
漏洞简介
Palmhttpd server是Jim Rees编写的简单的Palm系统的WEB服务器。
Palmhttpd服务程序对多个连接处理不正确,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
PalmOS只能接收一个客户端连接,但是\’\’httpd\’\’却实现了while(1)循环来进行accept()连接,因此httpd可接收多个连接,攻击者提交多个连接可导致出现\”Fatal Error, NetStack1.c overflowed accept queue\”,造成拒绝服务。
漏洞公告
厂商补丁:
shaun2k2
——–
补丁下载:
—httpd.patch
— httpd.c 2004-01-14 17:21:41.000000000 +0000
+++ httpd.1.c 2004-02-08 17:13:33.000000000 +0000
@@ -391,8 +391,15 @@
NetLibAddrINToA(AppNetRefnum,
ifinfo.param.interfaceInfo.ipAddr, host);
printf(“Listening on %s\n”, host);
– while (1) {
– if (f) {
+ /* Here is where the bug manifests: PalmOS can
only take 1 client
+ * connection (according to even the PalmOS
programming documentation),
+ * but this loop accept()s connections forever.
The loop is now commented
+ * out, fixing the bug.
+ * -Shaun2k2
+ */
+
+ /*while (1) {*/
+ if (f) {
xclose(f);
f = NULL;
}
@@ -507,7 +514,7 @@
}
printf(“stopped\n”);
-}
+/*}*/
char html0[] = “HTTP/1.0 200 OK\nMIME-version:
1.0\nContent-type: %s\n\n”;
—
参考网址
来源: BID
名称: 9608
链接:http://www.securityfocus.com/bid/9608
来源: BUGTRAQ
名称: 20040208 PalmOS httpd accept() queue overflow DoS vulnerability.
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107634638201570&w=2
来源: XF
名称: palmhttpd-accept-bo(15090)
链接:http://xforce.iss.net/xforce/xfdb/15090




















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)