14th Mar 2003 [SBWID-6065]
COMMAND
DeleGate Pointer Array Overflow May Let Remote Users Execute Arbitrary
Code
SYSTEMS AFFECTED
Tested Versions:
----------------
DeleGate 8.3.4 (UNIX)
DeleGate 8.4.0 (Windows)
PROBLEM
Thanks to Yutaka Sato and National Institute of Advanced Industrial
Science and Technology (AIST), Secure Net Service(SNS) Security
Advisory [[email protected]] Computer Security Laboratory, LAC
[http://www.lac.co.jp/security/] :
http://www.lac.co.jp/security/english/snsadv_e/63_e.html
DeleGate contains a vulnerability that could cause memory to be
overwritten, resulting in pointer array overflow if a large number of
User-Agent: lines are described in the robot.txt file.
Problem Description:
-------------------
When a client attempts to get a robot.txt file from a server site
through DeleGate, DeleGate adds some rules based on this file by
default, whenever it is run as HTTP-PROXY.
Describing several lines of User-Agent: in the robots.txt file could
cause memory to be overwritten, thus resulting in pointer array
overflow.
An attacker could potentially run codes of her choice through
exploitation.
SOLUTION
Upgrade to the fixed version Delegate 8.5.0.