COMMAND

    iPlanet/ Netscape Enterprise Web Publisher

SYSTEMS AFFECTED

    Netscape Enterprise 4.1 and prior versions.

PROBLEM

    Riley Hassell  from  eEye  found  following.   The  Web  Publisher
    feature  in  Netscape  Enterprise  4.1  is  vulnerable to a buffer
    overflow.  By  sending a large  buffer containing executable  code
    and a new Instruction Pointer, an attacker is able to gain  remote
    system shell access to the vulnerable server.

    The  overflow  itself  exists  in  Publishers  handling of the URI
    (Uniform  Resource  Identifier).   By  specifying   GETPROPERTIES,
    GETATTRIBUTENAMES,  or  any  other  one  of the publisher specific
    methods, we can  pass data into  vulnerable section of  the server
    and exploit the vulnerability.

    Example:

        C:\>telnet www.example.com 80
        Connecting To www.example.com... connected.
        GETPROPERTIES /(buffer) HTTP/1.1
        Host: Hostname
        (enter)
        (enter)

    Where (buffer) is 2000 characters.

    There is no a proof of concept exploit, however expect one soon.

SOLUTION

    Quote from iPlanet's development  team: "The security &  stability
    of  iPlanet's  customer's  environments  is  one  of our paramount
    concerns.  To ensure the stability of our customer's  environments
    iPlanet has made available an  NSAPI patch that can be  applied to
    iPlanet Web Server, Enterprise Edition."

    The NSAPI patch is available at:

        http://iplanet.com/products/iplanet_web_enterprise/iwsalert5.11.html

    This issue will  also be addressed  by the release  of iPlanet Web
    Server, Enterprise Edition version 4.1 Service Pack 8.