RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Link | Tags |
---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb | exploit |
https://www.exploit-db.com/exploits/18929 | exploit |
http://aluigi.altervista.org/adv/r4_1-adv.txt | exploit technical description |
https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.html | third party advisory |
https://www.rabidhamster.org/R4/download.php | product |
https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow | third party advisory |