COMMAND
Oracle
SYSTEMS AFFECTED
Oracle application server 4.0.8.2 + iWS 4.0/4.1 webserver
PROBLEM
Following is based on a S.A.F.E.R. Security Bulletin 0016. They
have been able to reproduce this on 2 different machines, with
very similar setup.
An exploitable buffer overflow has been identified in a shared
library which is being shipped with Oracle Application Server
4.0.8.2, and used by iPlanet Web Server if it is configured as
external web-listener.
iWS has to be configured as external `web listener' for Oracle
Application Server, so that iWS will load a shared library
($ORAHOME/ows/4.0/lib/ndwfn4.so) to handle requests for OAS.
Overflow happens when a long string is requested with prefix that
has been `linked' to OAS (by default it is /jsp/). which is then
passed to the library routines to be processed. Buffer size is
around 2050-60 bytes.
A request similar to:
GET /jsp/<A x 2050> HTTP/1.0
(perl -e 'print "GET /jsp/","A"x2050," HTTP/1.0\n\n"' | nc victim 80)
will trigger the overflow (iWS webserver should core-dump and be
restarted by watchdog; externally it will be seen as a dropped
connection). It is also possible that other versions of
OAS/iWS/Solaris are vulnerable.
S.A.F.E.R. have developed a working exploit for this problem which
will be publicly released. Credit goes to Fyodor Yarochkin.
SOLUTION
Oracle has been contacted, but they haven't been able to reproduce
this problem. S.A.F.E.R. would appreciate if people using OAS/iWS
could test this against their servers and let both us know the
results as other versions of the software might be vulnerable as
well (tested on Solaris). Oracle Security Team would appreciate
the results to be sent to secalert_us@oracle.com and S.A.F.E.R. to
security@relaygroup.com. No fixes are available at the time of
this writing.