EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities

Type securityvulns
Reporter Securityvulns
Modified 2002-11-13T00:00:00


Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities

Release Date: November 12, 2002

Severity: High (Remote SYSTEM level code execution)

Systems Affected: Macromedia Coldfusion 6.0 and prior (IIS ISAPI) Macromedia JRun 4.0 and prior (IIS ISAPI)

Description: Macromedia JRun and ColdFusion IIS ISAPI handlers contain various heap overflows when handling URI filenames. By supplying a filename over 4096 bytes in size, heap memory can be overwritten. Various structures can be overwritten in the process heap to gain control of the remote IIS process with SYSTEM level access. This makes it rather trivial for attackers to remotely compromise Microsoft IIS web servers running vulnerable versions of Macromedia Coldfusion or JRun.

The following requests can be used to duplicate the attack.

For JRun: telnet 80 GET /[+4096 byte buffer].jsp HTTP/1.0 [enter] [enter]

For Coldfusion: telnet 80 GET /[+4096 byte buffer].cfm HTTP/1.0 [enter] [enter]

During testing, 5000 bytes was sufficient to begin overwriting data structures that made exploitation straightforward. The vulnerabilities exist in error handling within the ISAPI filters.

Protection: eEye Digital Security customers using SecureIIS are protected from the exploitation of this vulnerability.

Vendor Status: Macromedia has released patches for both the JRun and Coldfusion products. ColdFusion MX Advisory: JRun Advisory:

Credit: Riley Hassell, Research Engineer - eEye Digital Security

Greetings: Eli, Kasia, Jenn, Hx2, and the all the crazy kiwi's with hackfu

Copyright (c) 1998-2002 eEye Digital Security Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please e-mail for permission.

Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

Feedback Please send suggestions, updates, and comments to:

eEye Digital Security