lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004c01c34d87$928158e0$0400a8c0@r00t3d.net>
Date: Fri, 18 Jul 2003 16:51:56 -0700
From: "Next Generation Insight Security Reseach Team" <mark@...software.com>
To: <bugtraq@...urityfocus.com>, <vulndb@...urityfocus.com>,
	<vulnwatch@...nwatch.org>
Subject: Witango & Tango 2000 Application Server Remote System Buffer Overrun


NGSSoftware Insight Security Research Advisory

Name:                          WiTango Application Server & Tango 2000
Systems Affected:         Windows
Severity:                       Critical Risk
Category:                      Remote System Buffer Overrun
Vendor URL:                http://www.witango.com
Author:                         Mark Litchfield (mark@...software.com)
Date:                            18th July 2003
Advisory number:         #NISR18072003


Description
***********

As detailed on http://www.witango.com - Witango can provide your Web
Application with a solid application framework, a simple interface for both
the production and ongoing maintenance of complex application logic, a
variety of mechanisms to integrate to non-web interfaces, and a wide range
of database connectivity options. The Witango product suite provides a
comprehensive Integrated Development Environment (IDE) to enable application
developers to rapidly generate XML files which can then be deployed to a
wide range of operating systems.  Witango is a fast to learn, easy to use,
scalable solution for the Professional Web Application Developer.

Details
*******

By passing a long cookie to Witango_UserReference we overwrite the saved
return address on the stack.  As Witango is installed as LocalSystem, any
arbitrary code execution will run as SYSTEM

GET /ngssoftware.tml HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword,
application/x-shockwave-flash, */*
Accept-Language: en-gb
User-Agent: My Browser
Host: ngssoftware.com
Connection: Keep-Alive
Cookie: Witango_UserReference= parameter length 2864

I have been asked by Phil Wade of Witango to mention the following: "We also
did some tests on older versions of the server and found the vulnerability
also exists in the previous version of the server which was known as Tango
2000.  Can you also mention that Tango 2000 is also vulnerable and should be
upgraded to Witango 5.0.1.062 especially if the Tango 2000 server is
accessible from the internet"

Fix Information
***************

NGSSoftware alerted Witango to this issue on 13th July 2003.  I would like
to mention, that Witango acted very quickly in producing a patch helping to
ensure that their clients are protected.  Please visit
http://www.witango.com to download the latest build.

A check for this issue has been added to Typhon, a comprehensive automated
vulnerability assessment tool of which more information is available from
the
NGSSite http://www.ngssoftware.com

About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners.  Based in the United Kingdom, NGSSoftware have
offices in London, and St Andrews Scotland.  NGSSoftware's sister company
NGSConsulting, offers best of breed security consulting services,
specialising in application, host and network security assessments.

http://www.ngssoftware.com
http://www.ngsconsulting.com

Telephone: +44 208 40 100 70
Fax: +44 208 401 0076



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ