[<prev] [next>] [day] [month] [year] [list]
Message-ID: <003701c25fb9$b1eec940$4500a8c0@kpmguek0e8d7an>
From: pgrundl at kpmg.dk (Peter Gründl)
Subject: KPMG-2002035: IBM Websphere Large Header DoS
--------------------------------------------------------------------
Title: IBM Websphere Large Header DoS
BUG-ID: 2002035
Released: 19th Sep 2002
--------------------------------------------------------------------
Problem:
========
A malicious user can issue a malformed HTTP request and cause the
webserver to crash.
Vulnerable:
===========
- IBM Websphere 4.0.3 on Windows 2000 Server
Details:
========
The application does not perform proper bounds check on large HTTP
headers, and as a result the application can be crashed by a remote
user. It could not be established if this could lead to code execu-
tion.
If a request is made for a .jsp ressource (the .jsp file does not
need to exist), and the HTTP field "Host" contains 796 characters or
more, the web service will crash. Other HTTP fields are also
vulnerable if the size is increased to 4K.
The web service sometimes recovers on it's own.
Vendor URL:
===========
You can visit the vendor webpage here: http://www.ibm.com
Vendor response:
================
The vendor was notified on the 4th of June, 2002. On the 12th of July
the vendor sent us a patch for the problem. On the 19th of September
we confirmed that the patch was officially released.
Corrective action:
==================
Install PQ62144 (supercedes PQ62249). The URL is wrapped:
http://www-1.ibm.com/support/docview.wss?
rs=180&context=SSEQTP&q=PQ62144&uid=swg24001610
Author: Peter Gr?ndl (pgrundl@...g.dk)
--------------------------------------------------------------------
KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.
--------------------------------------------------------------------
Powered by blists - more mailing lists