exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

11.04.02b.txt

11.04.02b.txt
Posted Nov 13, 2002
Authored by Tamer Sahin, David Endler | Site idefense.com

iDEFENSE Security Advisory 11.04.02b - Northern Solutions' Xeneo Web Server v2.1.0.0 (PHP version) is vulnerable to a remote denial of service attack making the server crash with a Microsoft Visual C++ runtime error message. Fix available here.

tags | remote, web, denial of service, php
SHA-256 | 6666bb2c685153ee0151cae36a27b81d2f2a4710105f318be7fe42b918d20de4

11.04.02b.txt

Change Mirror Download
iDEFENSE Security Advisory 11.04.02b: 
http://www.idefense.com/advisory/11.04.02b.txt
Denial of Service Vulnerability in Xeneo Web Server
November 4, 2002

I. BACKGROUND

Northern Solutions' Xeneo Web Server is a "fast, compact web server that
makes it easy to set up and administer a web site on the Windows platform."
More information about the application is available at
http://www.northernsolutions.com/index.php?view=product&id=1.

II. DESCRIPTION

Due to the improper handling of a specially crafted web request, remote
attackers may launch a denial of service attack against the PHP version of
Xeneo. The condition is triggered when the web server receives a request for
'%'. Upon successful exploitation, the web server will crash with a Microsoft
Visual C++ runtime error message. The following is an example attack URL:

http://target.server/%

III. ANALYSIS

Any remote user with access to the application can launch this attack,
thereby denying legitimate users access to the server and the contents
and/or additional services provided.

IV. DETECTION

Xeneo 2.1.0.0 (PHP version) and 2.0.759.6 are vulnerable.

V. WORKAROUND

Use a filtering web proxy server to help mitigate against exploitation.

VI. VENDOR FIX

Xeneo 2.1.5 and later should fix the problem. The latest release is version
2.1.6.0, and it can be downloaded at
http://www.northernsolutions.com/downloads/xeneo_php_setup.exe.

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1248 to this issue.

VIII. DISCLOSURE TIMELINE

10/06/2002 Issue disclosed to iDEFENSE
10/31/2002 Author notified
10/31/2002 iDEFENSE clients notified
10/31/2002 Response received from Robert Shanahan
(rshan@northernsolutions.com)
11/04/2002 Public disclosure

IX. CREDIT

Tamer Sahin (ts@securityoffice.net) discovered this vulnerability.
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close