asp2php perparse 缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108348 漏洞类型 缓冲区溢出
发布时间 2004-12-15 更新时间 2005-01-10
CVE编号 CVE-2004-1261 CNNVD-ID CNNVD-200501-103
漏洞平台 Windows CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/25016
https://www.securityfocus.com/bid/82599
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200501-103
|漏洞详情
asp2php是一套将asp代码转换为PHP代码的程序。asp2php0.76.23版本中preparse函数存在多个缓冲区溢出漏洞。攻击者通过特别构造的ASP脚本,利用此漏洞执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/12014/info

asp2php is prone to a buffer overflow vulnerability. This issue is exposed when the application is used to convert an ASP file to PHP. The particular issue is related to parsing of tokens in ASP files. Since ASP files may originate from an external or untrusted source, this vulnerability is considered to be remote in nature.

Successful exploitation would allow for execution of arbitrary code in the context of the user running the application.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25016.zip
|受影响的产品
asp2php asp2php 0.76.23
|参考资料

来源:XF
名称:asp2php-preparse-bo(18585)
链接:http://xforce.iss.net/xforce/xfdb/18585
来源:MISC
链接:http://tigger.uic.edu/~jlongs2/holes/asp2php.txt