The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Macromedia JRun4 mod_jrun Apache Module Buffer Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 4 Oct 2004 14:05:56 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NEWS] Macromedia JRun4 mod_jrun Apache Module Buffer Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Macromedia JRun4 mod_jrun Apache Module Buffer Overflow
------------------------------------------------------------------------


SUMMARY

Macromedia  <http://www.macromedia.com/software/jrun/>; JRun 4 is an 
application server used for developing and deploying Java applications. 
JRun 4 provides the speed and reliability required to deploy and manage 
your standards-based Internet applications.

Remote exploitation of a buffer overflow vulnerability in Macromedia's 
JRun 4 mod_jrun Apache module could allow execution of arbitrary code.

DETAILS

Vulnerable Systems:
 * JRun 4 SP1a (mod_jrun) on Apache versions 1.3.x and 2.0.x, possibly all 
versions of mod_jrun are vulnerable

Immune Systems:
 * Patched versions of mod_jrun from Macromedia's cumulative security 
update

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0646>; 
CAN-2004-0646

The problem exists in the WriteToLog function of mod_jrun and mod_jrun20, 
where a fixed size buffer is allocated on the stack.

No bounds checking is performed on the input. When the Verbose logging 
option is set, this function may be called with user-supplied data. If 
this data is longer than the space which has been allocated, a buffer 
overflow may occur. Specially formed input may allow execution of 
arbitrary commands.

Impact
Successful exploitation allows execution of arbitrary code with the 
permissions of the user of the httpd process, typically 'nobody' or 
'apache'. Note, As the Verbose option is not set by default, most installs 
will not be vulnerable. An overly long Content-Type field, among other 
header fields, can be used to trigger this buffer overflow.

Workaround
Setting the Verbose option to "false" in the httpd.conf will prevent this 
vulnerability from being exploitable. After editing the httpd.conf, 
restart the httpd. This will reduce the amount of data logged by the 
server, but will prevent exploitation of this vulnerability.

Vendor Status:
MPSB04-08 - Cumulative Security Patch available for JRun server can be 
found at  
<http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html>; 
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html

Disclosure Timeline
06/18/04 iDEFENSE Clients notified
06/18/04 Initial vendor notification
06/18/04 Initial vendor response
09/29/04 Public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:[email protected]> iDEFENSE Security Labs.
The original article can be found at:  
<http://www.idefense.com/application/poi/display?id=145&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=145&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру