Shaun2k2 Palmhttpd Server远程拒绝服务攻击漏洞

漏洞信息详情

Shaun2k2 Palmhttpd Server远程拒绝服务攻击漏洞

漏洞简介

Palmhttpd server是Jim Rees编写的简单的Palm系统的WEB服务器。
Palmhttpd服务程序对多个连接处理不正确,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
PalmOS只能接收一个客户端连接,但是\’\’httpd\’\’却实现了while(1)循环来进行accept()连接,因此httpd可接收多个连接,攻击者提交多个连接可导致出现\”Fatal Error, NetStack1.c overflowed accept queue\”,造成拒绝服务。

漏洞公告

厂商补丁:
shaun2k2
——–
补丁下载:

—httpd.patch

— httpd.c 2004-01-14 17:21:41.000000000 +0000

+++ httpd.1.c 2004-02-08 17:13:33.000000000 +0000

@@ -391,8 +391,15 @@

NetLibAddrINToA(AppNetRefnum,

ifinfo.param.interfaceInfo.ipAddr, host);

printf(“Listening on %s\n”, host);

– while (1) {

– if (f) {

+ /* Here is where the bug manifests: PalmOS can

only take 1 client

+ * connection (according to even the PalmOS

programming documentation),

+ * but this loop accept()s connections forever.

The loop is now commented

+ * out, fixing the bug.

+ * -Shaun2k2

+ */

+

+ /*while (1) {*/

+ if (f) {

xclose(f);

f = NULL;

}

@@ -507,7 +514,7 @@

}

printf(“stopped\n”);

-}

+/*}*/

char html0[] = “HTTP/1.0 200 OK\nMIME-version:

1.0\nContent-type: %s\n\n”;

参考网址

来源: BID
名称: 9608
链接:http://www.securityfocus.com/bid/9608

来源: BUGTRAQ
名称: 20040208 PalmOS httpd accept() queue overflow DoS vulnerability.
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107634638201570&w=2

来源: XF
名称: palmhttpd-accept-bo(15090)
链接:http://xforce.iss.net/xforce/xfdb/15090

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享