Novell eDirectory/iMonitor HTTPSTK栈缓冲区溢出漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Novell eDirectory是一个的跨平台的目录服务器。 Novell eDirectory在处理用户请求构造回应时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。 Novell的HTTP协议栈(httpstk)没有检查客户端所提供的HTTP Host请求头(如Host: www.host.com)的值。当服务器在准备HTTP重新定向响应调用snprintf()时可能会触发这个漏洞,导致以加载httpstk库进程的权限执行任意指令。C++伪代码如下: #define HTTPHDR_HOST_FIELD 211 char szHttp[] = "HTTP"; char szHttps[] = "HTTPS"; char szHttpS[] = "http%s://"; char szCrlf[] = "\r\n"; char szS[] = "s"; char szD[] = ":%d"; char szS_3[] = "%s"; BYTE nullbyte = '\0'; typedef struct SAL_AddrBuf_t { short sin_family; u_short sin_port; struct in_addr sin_addr; struct in6_addr sin6_addr; char sa_data[42]; } SAL_AddrBuf; class HRequest { public: int SendRedirectRsp(void); int SendHeader(int); int SendNotFoundRsp(void); int SendEndOfContent(void); int RspSetHdrValue(char *, char *); bool ReqIsSecureChannel(void); char *ReqHdrValue(unsigned int); SAL_AddrBuf *ReqHostAddress(void); private: int BuildRedirectURL(unsigned int, bool, char...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息