Rapid7 Vulnerability & Exploit Database

Macromedia JRun ISAPI Host Header Buffer Overflow

Back to Search

Macromedia JRun ISAPI Host Header Buffer Overflow

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
08/12/2002
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

Macromedia JRun v3.1 ships with an ISAPI filter to handle requests for JSP scripts. When a direct request with an overly long HTTP 'HOST' header is made to this filter, a stack buffer is overflowed. Because Microsoft Internet Information Services (IIS) loads ISAPI filters under the context of the SYSTEM account, successful exploitation will yield complete access.

Solution(s)

  • jrun-31-patch-build-26414

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;