netcat 1.11 for Windows is released
Results 1 to 2 of 2

Thread: netcat 1.11 for Windows is released

  1. #1
    Senior Member
    Join Date
    May 2004
    Posts
    274

    netcat 1.11 for Windows is released

    Application: Netcat for Windows 1.1
    Platform: Windows NT/2000/XP/2003
    Severity: Remote code execution
    Status: Fixed, new version available
    Date: 12/27/2004


    Summary

    Netcat for Windows 1.1 has a buffer overflow vulnerability that allows
    remote execution of code. It is exposed when netcat is run using the -e
    option which execs a process and pipes the listening socket io to the
    stdio of the exec'd process.

    Note that this issue does not exist in netcat for the unix platform.


    Details

    doexec.c (line 445) was missing a check to see if BufferCnt had incremented
    past the end of the recieve buffer. With the check in place the buffer is
    flushed before it overwrites the end. The following new line adds the
    check.

    if (RecvBuffer[0] == '\n' || RecvBuffer[0] == '\r' ||
    BufferCnt > BUFFER_SIZE-1) {


    Update

    A fixed version, Netcat for Windows 1.11, is available at:
    http://www.vulnwatch.org/netcat/


    Credit

    Hat Squad discovered this vulnerabiltiy. Hat Squad's advisory is available
    at http://www.hat-squad.com/en/000142.html
    Source: http://www.vulnwatch.org/netcat/netcat-111.txt
    For downloading: http://www.vulnwatch.org/netcat/
    Excuse me, is there an airport nearby large enough for a private jet to land?

  2. #2
    Banned
    Join Date
    Jun 2003
    Posts
    1,302
    Wow, who would of thought about netcat being vulnerable to a buffer overflow. Makes me want to take a little look at the source, and see if I can find anything.

    Nice little read.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •