Orenosv HTTP/FTP Server FTP命令远程缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108768 漏洞类型 缓冲区溢出
发布时间 2005-05-09 更新时间 2007-04-16
CVE编号 CVE-2005-1666 CNNVD-ID CNNVD-200505-1115
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/25631
https://www.securityfocus.com/bid/13546
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1115
|漏洞详情
OrenosvHTTP/FTPServer0.8.1存在多个缓冲区溢出,远程验证用户可以通过传给FTP命令(如MKD、RMD或DELE等由(1)ftp_xlate_path,(2)ftp_is_canonical或(3)os_fn_nativize函数执行的命令)的长参数,或者(4)由cgissi.exe内的parse_cmd函数所执行的长SSI命令,发起拒绝服务攻击(服务器崩溃)并可能执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/13549/info

Orenosv HTTP/FTP server is prone to a remote buffer overflow vulnerability that affects 'cgissi.exe'.

This issue presents itself when the application handles excessive values supplied through an SSI command name.

A successful attack can result in memory corruption and can be leveraged to cause a denial of service condition or arbitrary code execution. Arbitrary code execution can result in a remote compromise in the context of the server.

Orenosv HTTP/FTP Server 0.8.1 is reportedly vulnerable, however, other versions may be affected as well. 

<!--#aaaaa... -->

Approx. 120 bytes of aaaaaa...
|受影响的产品
Orenosv Orenosv HTTP/FTP Server 0.8.1
|参考资料

来源:BID
名称:13549
链接:http://www.securityfocus.com/bid/13549
来源:BID
名称:13546
链接:http://www.securityfocus.com/bid/13546
来源:VUPEN
名称:ADV-2005-0499
链接:http://www.frsirt.com/english/advisories/2005/0499
来源:SECTRACK
名称:1013923
链接:http://securitytracker.com/id?1013923
来源:hp.vector.co.jp
链接:http://hp.vector.co.jp/authors/VA027031/orenosv/index_en.html
来源:XF
名称:orenosv-http-ftp-cgissi-bo(20512)
链接:http://xforce.iss.net/xforce/xfdb/20512
来源:XF
名称:orenosv-http-ftp-commands-bo(20510)
链接:http://xforce.iss.net/xforce/xfdb/20510
来源:MISC
链接:http://www.security.org.sg/vuln/orenosv081.html
来源:MISC
链接:http://www.securiteam.com/windowsntfocus/5FP0H00FPS.html
来源:OSVDB
名称:16166
链接:http://www.osvdb.org/16166
来源:OSVDB
名称:16165
链接:http://www.osvdb.org/16165
来源:SECUNIA
名称:15302
链接:http://secunia.com/advisories/15302