Bugtraq mailing list archives

Avirt Proxy Buffer Overflow Vulnerabilities


From: Strumpf Noir Society <vuln-dev () labs secureance com>
Date: Thu, 17 Jan 2002 20:23:28 +0100

Strumpf Noir Society Advisories
! Public release !
<--#


-= Avirt Proxy Buffer Overflow Vulnerabilities =-

Release date: Thursday, January 17, 2002


Introduction:

The Utah, USA-based company Avirt specializes in the development
of (inter-)networking and sharing technologies. As such, it
maintains the SOHO and Gateway proxy product lines.

These products can be found at vendor Avirt's web site:
http://www.avirt.com


Problem:

The products from above mentioned families are all vulnerable to
a buffer overflow condition, which can be exploited to execute
arbitrary code on the systems in question.

The problem appears to be due to incorrect bounds checking in regards to
the header fields for the standard HTTP proxy (port 8080 by default). If
these headers exceed the 2319 bytes in size, the corresponding buffer
will overflow.

Besides allowing for a DoS attack against a vulnerable system this
could be exploited to execute arbitrary code on the host, EIP IS
overwritten. These Avirt products run as a NT system service by 
default.


(..)


Solution:

Vendor has been notified. After trying to confirm receipt of our initial
e-mail to them, we received a message with in the subject line "SPAM?",
which stated the following:

"As of right now, we will add the problem to our bug list which will be
consulted when any upgrades are made."

This was tested on a Win2k configuration with the following Avirt
products:

Avirt SOHO v4.2
Avirt Gateway v4.2
Avirt Gateway Suite v4.2

Earlier versions could be vulnerable as well.


yadayadayada

SNS Research is rfpolicy (http://www.wiretrip.net/rfp/policy.html) 
compliant, all information is provided on AS IS basis.

EOF, but Strumpf Noir Society will return!



Current thread: