Buffer overflow Sarg 2.2.3.1

1. Buffer overflow Sarg 2.2.3.1

Anderson L Tamborim
y2h4ck

(usa Suse)

Enviado em 03/03/2008 - 13:23h

======================================================================
Squid Analysis Report Generator <= 2.2.3.1 buffer overflow ======================================================================
------------------------------
Affected software description:
------------------------------

Application: Squid Analysis Report Generator
Version: <= 2.2.3.1
Vendor: http://sarg.sourceforge.net

Description:
Squid Analysis Report Generator is a tool that allow you to view "where" your users are going to on the Internet.


--------------
Vulnerability:
--------------

Execution of arbitrary code is possible by executing sarg with specially crafted squid log files (access and useragent log).

The access.log has to be manually created to trigger the exploit, as squid will not allow malformed HTTP methods.

The useragent log is more critical, as this vulnerability can be exploited by just passing the useragent string within a request to the squid proxy.


------------
PoC/Exploit:
------------

Edit a normal access log and set the request method to an overly long string.

Edit a normal useragent log and set the useragent field to an overly long string or send a request to the Squid proxy server passing an overly long string as useragent in the HTTP header.


---------
Solution:
---------

Upgrade to version 2.2.4 or higher.



  


2. Re: Buffer overflow Sarg 2.2.3.1

Thiago Fernandes de Melo
m4tri_x

(usa Ubuntu)

Enviado em 03/03/2008 - 14:03h

vish eu tinha acabado de instalar essa versão em um cliente, ;D
jah to atualizando...


Vlw...

[]´s






Patrocínio

Site hospedado pelo provedor RedeHost.
Linux banner

Destaques

Artigos

Dicas

Tópicos

Top 10 do mês

Scripts