OReilly WebSite 1.x/2.0 win-c-sample.exe Buffer Overflow Vulnerability

ID EDB-ID:20484
Type exploitdb
Reporter Solar Designer
Modified 1997-01-06T00:00:00


OReilly WebSite 1.x/2.0 win-c-sample.exe Buffer Overflow Vulnerability. CVE-1999-0178. Dos exploit for windows platform

                                            source: http://www.securityfocus.com/bid/2078/info

O'Reilly WebSite (Pro) is a Windows 95/NT Web Server package. Versions 2.0 and below contained a vulnerable sample script, win-c-sample.exe, placed by default in /cgi-shl/ off the web root directory. This program is vulnerable to a buffer overflow, allowing for execution of arbitrary commands on the host machine with the privileges of the web server. Consequences of successful exploitation could range from destruction of data and web site defacement to elevation of privileges through locally exploitable vulnerabilities. 

Windows NT (versions unspecified):

Windows 95:

The example dos commands just copy the WebSite's readme.1st file, so you
can later check if the exploit worked by trying http://website.host/x1.htm.
Note that the server should respond to these exploits with an "Error: no
blank line separating header and data", because of the "1 file(s) copied"
message appearing without a blank line before it (which is required for
HTTP; if you need a command's output, you can redirect it to a file, and
get that file via HTTP with a separate request).