what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CISADV000420.txt

CISADV000420.txt
Posted Apr 24, 2000
Authored by David Litchfield

Cerberus Information Security Advisory CISADV000420 - Windows NT/2000 cmd.exe overflow. Web servers that will execute batch files as CGI scripts on behalf of a client are therefore opened up to a Denial of Service attack. By providing an overly long string as an argument to a CGI based batch file it is possible to crash the command interpreter in the "clean up" stages.

tags | web, denial of service, overflow, cgi
systems | windows
SHA-256 | 0dcbdc1ab5da7d7148582f2f06ad1011474b95363fe58c05094dfee1821bee25

CISADV000420.txt

Change Mirror Download
Cerberus Information Security Advisory (CISADV000420)
http://www.cerberus-infosec.co.uk/advisories.html

Released : 20th April 2000
Name : CMD.EXE overflow
Affected Systems : Windows NT/2000
Issue : See details
Author : David Litchfield (mnemonix@globalnet.co.uk)

Description
***********
The Cerberus Security Team has discovered an overflow issue in the Windows
NT/ 2000 command interpreter "cmd.exe". This problem was discovered whilst
looking for buffer overflow issues on certain web servers. Web servers that
will execute batch files as CGI scripts on behalf of a client are therefore
opened up to a Denial of Service attack.


Details
*******
By providing an overly long string as an argument to a CGI based batch file
it is possible to crash the command interpreter in the "clean up" stages.
Although control of the Instruction Pointer register (EIP) is gained it is
done so with a UNICODE address eg 0x00410041. Having debugged the
application it seems that, in this case, there is nowhere useful in memory
to jump to to be able to get back to any "exploit code".


Solution:
*********
It is best not to allow web servers to execute batch files as CGI scripts
anyway as these can often be subverted to run arbitary commands and so
Cerberus would recommend disabling any script mappings for this. On top of
this the patch should be applied as well.

Vendor Status
*************
Microsoft were informed on the 15th of March about this issue and have
developed a patch . More information is available from
http://www.microsoft.com/technet/security/bulletin/ms00-027.asp

About Cerberus Information Security, Ltd
********************************
Cerberus Information Security, Ltd, a UK company, are specialists in
penetration testing and other security auditing services. They are the
developers of CIS (Cerberus' Internet security scanner) available for free
from their website: http://www.cerberus-infosec.co.uk

To ensure that the Cerberus Security Team remains one of the strongest
security audit teams available globally they continually research operating
system and popular service software vulnerabilites leading to the discovery
of "world first" issues. This not only keeps the team sharp but also helps
the industry and vendors as a whole ultimately protecting the end consumer.
As testimony to their ability and expertise one just has to look at exactly
how many major vulnerabilities have been discovered by the Cerberus Security
Team - over 60 to date, making them a clear leader of companies offering
such security services.

Founded in late 1999, by Mark and David Litchfield, Cerberus Information
Security, Ltd are located in London, UK but serves customers across the
World. For more information about Cerberus Information Security, Ltd please
visit their website or call on +44(0) 181 661 7405

Permission is hereby granted to copy or redistribute this advisory but only
in its entirety.

Copyright (C) 2000 by Cerberus Information Security, Ltd

Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close