TUCoPS :: Windows Apps :: statsr.htm

Mediahouse Statistics Server v4.28 & 5.01 Buffer Overflow
Vulnerability

    Mediahouse Statistics Server

Affected

    Mediahouse Statistics Server v4.28 & 5.01

Description

    Per Bergehed  posted following.   His colleague  found a  security
    flaw in Mediahouse Statistics Server.  A more detailed description
    of the flaw can be found at

        http://w1.855.telia.com/~u85513179/index.html

    There  is  an  "unchecked  buffer"  in the webinterface for remote
    administration  of  Statistics  Server.   For example, Mediahouses
    own live demo page at http://stats.mhstats.com/_938425738_/    The
    "server  ID"  login  page  can  be  used  for an "buffer overflow"
    attack.   The input  field is  only validated  on the  client side
    (webbrowser).  This is easy to circumvent.  The second flaw is the
    configuration  file  (ss.cfg)  which  contains  the  administrator
    password in clear-text!

    To exploit this, use your personal "favourite tool" to send  >3773
    characters into the Statistics Server  and it will generate a  "Dr
    Watson"!   There is  a "brain.ini"  file for  the Retina  security
    scanner on description site.

    If you have plans to write an exploit you might find this  useful:
    Statistics Server v 4.28 will "jump" to the address "65656565"  if
    you send a couple of 'a's..

Solution

    Hopefully Mediahouse will publish a fix soon..  Workarounds:

        1. Restrict access to Statistics Server in your firewall.
        2. Run the Statistics Server service under a user account with
           lower privileges.
        3. Set proper ACLs on the configuration file:
               "C:\StatisticsServer\ss.cfg".
        4. Don't open up your firewall until a fix is released!!

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH