Skip navigation

Several WebBBS Buffer Overruns

 
Several Buffer Overruns In WebBBS
Reported June 30 by
Delphis Consulting Plc

VERSIONS AFFECTED
WebBBS v1.17

DESCRIPTION

Two unchecked buffer conditions exists in the WebBBS software located in the search function and in the new user signup function.

By using an overly long search string it is possible to cause a denial of service attack against a remote server. In addition, by sending a user name of 896 bytes (user name + EIP pointer) a buffer overrun will occur, thereby allowing an intruder to run code on the remote system.

VENDOR RESPONSE

The author is aware of the problem but has not released a correct version. WebBBS Home Page

CREDITS
Discovered and reported by Delphis Consulting Plc

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish