COMMAND

    Alibaba

SYSTEMS AFFECTED

    Alibaba 2.0

PROBLEM

    Thomas  Dullien  found  following.   He  tried  a  little freeware
    webserver named  Alibaba 2.0  and found  an exploitable  overflow.
    He telnetted to 127.0.0.1:80 and crashed it using

        POST [enter 1028 'x'] / HTTP/1.0

    From a disassembled listing Thomas found that it uses a

        scanf("%s %s %s", szName, szFile, szSomething);

    where szFile  is a  local variable  of 0x400  (=1024) bytes on the
    stack directly above  the return address.   Coding an exploit  for
    this is going to be a  little tricky as it mustn't have  any 0x20,
    0x00,  0x61-0x7A  in  it  since  these  bytes  are  changes by the
    foregoing function that converts everything into uppercase.

SOLUTION

    The  authorswere  contacted  but  they  stated  since its freeware
    there will be no support to it!?