exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netchat73.txt

netchat73.txt
Posted May 18, 2004
Authored by Marius Huse Jacobsen

NetChat, an application intended to allow users on the same subnet to chat with one another, is susceptible to a stack-based buffer overflow. Versions 7.3 and below are affected. The overflow allows for arbitrary code execution under the user running the application.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 0b23d03452960631df48fd8aceeddd1515e1df9580a7a65525607ba2e60e0f00

netchat73.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NetChat HTTP Server Stack Overflow

RELEASE DATE: May 16, 2004

DATE REPORTED: May 12, 2004

RISK: Medium

IMPACT: Attackers may be able to execute
arbitrary code with the privileges
of the user running the applicaton.

VERSIONS: <= 7.3

OVERVIEW:

NetChat is an application intended to allow users on the same
subnet to chat with one another. It comes with an integrated
web server for sharing files. The web server in versions
7.3 and earlier is vulnerable to a stack-based buffer overflow
allowing for arbitrary code execution under the security
context of the user running the application.

DETAILS:

The overflow condition exists due to an unchecked call to
_sprintf when the HTTP server attempts to handle a GET
request. This allows the attacker to overwrite a pointer
that is later referenced in the same function.

VENDOR STATUS:

The vendor has released version 7.4 to address this
vulnerability.

CREDIT:
Discovery: Marius Huse Jacobsen
Email: mahuja@c2i.net
Research/Exploit: David Dewey
Email: dbd@hushmail.com

THANKS: skape - for your help with my questions on shellcode and
great help with the additional analysis.

RELATED LINKS:

http://run.to/sz

FEEDBACK:

Please send questions and comments to dbd@hushmail.com
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkCoIicACgkQ2oHGriYB1OlDFACeMiQQkVF5B1lDJybzUYiHo5fvRLoA
n3m3HC9QHp4EzCaP7Sudq/2FNBRR
=w/9d
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program:
https://www.hushmail.com/about.php?subloc=affiliate&l=427
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close