iPlanet (Sun ONE) Web Server chunked transfer encoding heap buffer overflow
|iplanet-chunked-encoding-bo (9799)||High Risk|
Sun ONE Web server (formerly iPlanet Web Server) is vulnerable to a buffer overflow in the function that handles chunked transfer encoding. By sending a specially-crafted GET request that uses chunked transfer encoding to a vulnerable Web server, a remote attacker could overflow a buffer and cause the Web server to crash or execute code on the server.
For vulnerability detection:
Enable the following checks in the ISS Protection Platform:
Block or restrict the following in the ISS Protection Platform as appropriate to the environment:
Port 80 / 443
For Manual Protection:
Upgrade to the latest version of iPlanet Web Server (4.1 SP11 or later), as listed in Sun Alert ID: 46128. See References.
— OR —
Upgrade to the latest version of Sun ONE Web Server (6.0 SP4 or later), as listed in Sun Alert ID: 46128. See References.
- eEye Digital Security Advisory AD20020808a: Sun ONE / iPlanet Web Server 4.1 and 6.0 Remote Buffer Overflow.
- iPlanet Security Alert, 23 July 2002: Sun(TM) ONE Web Server Security Advisory: Buffer Overflow in Transfer Encoding.
- Sun Alert ID: 46128: Sun ONE Web Server Transfer Encoding Buffer Overflow Vulnerability.
- BID-5433: Sun ONE/iPlanet Web Server Chunked Encoding Vulnerability
- CVE-2002-0845: Buffer overflow in Sun ONE / iPlanet Web Server 4.1 and 6.0 allows remote attackers to execute arbitrary code via an HTTP request using chunked transfer encoding.
- OSVDB ID: 5070: Sun iPlanet Chunked Transfer Encoding Overflow
- Sun iPlanet Web Server 4.1
- Sun iPlanet Web Server 6.0
- Sun ONE Web Server 4.1
- Sun ONE Web Server 6.0
Aug 08, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this