Shaun2k2 Palmhttpd Server远程拒绝服务攻击漏洞
发布日期:2004-02-09
更新日期:2004-02-19
受影响系统:Jim Rees httpd for PalmOS
shaun2k2 palmhttpd 3.0
描述:
BUGTRAQ ID:
9608
CVE(CAN) ID:
CVE-2004-0264
Palmhttpd server是Jim Rees编写的简单的Palm系统的WEB服务器。
Palmhttpd服务程序对多个连接处理不正确,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
PalmOS只能接收一个客户端连接,但是'httpd'却实现了while(1)循环来进行accept()连接,因此httpd可接收多个连接,攻击者提交多个连接可导致出现"Fatal Error, NetStack1.c overflowed accept queue",造成拒绝服务。
<*来源:shaun2k2 (
shaunige@yahoo.co.uk)
链接:
http://marc.theaimsgroup.com/?l=bugtraq&m=107634638201570&w=2
*>
建议:
厂商补丁:
shaun2k2
--------
补丁下载:
---httpd.patch
--- httpd.c 2004-01-14 17:21:41.000000000 +0000
+++ httpd.1.c 2004-02-08 17:13:33.000000000 +0000
@@ -391,8 +391,15 @@
NetLibAddrINToA(AppNetRefnum,
ifinfo.param.interfaceInfo.ipAddr, host);
printf("Listening on %s\n", host);
- while (1) {
- if (f) {
+ /* Here is where the bug manifests: PalmOS can
only take 1 client
+ * connection (according to even the PalmOS
programming documentation),
+ * but this loop accept()s connections forever.
The loop is now commented
+ * out, fixing the bug.
+ * -Shaun2k2
+ */
+
+ /*while (1) {*/
+ if (f) {
xclose(f);
f = NULL;
}
@@ -507,7 +514,7 @@
}
printf("stopped\n");
-}
+/*}*/
char html0[] = "HTTP/1.0 200 OK\nMIME-version:
1.0\nContent-type: %s\n\n";
---
浏览次数:3394
严重程度:0(网友投票)