var-200411-0013
Vulnerability from variot

RealNetworks Helix Universal Server 9.0.2 for Linux and 9.0.3 for Windows allows remote attackers to cause a denial of service (CPU and memory exhaustion) via a POST request with a Content-Length header set to -1. The problem surrounds the mishandling of some POST headers values. An attacker can exploit this issue to cause the affected server to consume excessive computer resources and hang, denying service to legitimate users. BACKGROUND

RealNetworks Helix Universal Server is a universal digital media delivery platform with industry leading performance, integrated content distribution and Web services support. More information is available at http://www.realnetworks.com.

II.

The problem specifically exists in the handling of specially crafted POST requests. Generating a request with the Content-Length header set to -1 triggers an integer handling error resulting in mass utilization of memory and CPU time.

III. ANALYSIS

Any unauthenticated remote attacker can exploit this vulnerability, which causes the affected system to utilize mass amounts of memory and CPU time. The system will no longer be able to process future requests.

The affected server must be restarted in order to resume normal functionality.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in RealNetworks Helix Server version 9.0.2 for Linux and version 9.0.3 for Windows. It is suspected that earlier versions on both platforms are vulnerable as well.

V. WORKAROUND

Usage of an inline application level filter can help mitigate risk of exploitation by scanning for and filtering invalid Content-Length parameters.

VI. VENDOR RESPONSE

"Customers are encouraged to upgrade their Server software to the latest version, which contains a security patch."

RealNetworks has released binaries that guard against the described vulnerability. The related advisory from RealNetworks is available at:

http://service.real.com/help/faq/security/security100704.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2004-0774 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

07/01/2004 Initial vendor notification 07/01/2004 iDEFENSE clients notified 08/05/2004 Initial vendor response 10/07/2004 Coordinated public Disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.


Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "helix universal server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realnetworks",
        "version": "9.0.2"
      },
      {
        "model": "helix universal server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realnetworks",
        "version": "9.0.4.958"
      },
      {
        "model": "helix universal mobile server and gateway",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realnetworks",
        "version": "10.3.1.716"
      },
      {
        "model": "helix universal mobile server and gateway",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realnetworks",
        "version": "10.3.1.716"
      },
      {
        "model": "helix universal server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realnetworks",
        "version": "9.0.4.958"
      },
      {
        "model": "helix universal mobile server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "10.3.1.716"
      },
      {
        "model": "helix universal mobile server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "10.1.1.120"
      },
      {
        "model": "helix universal mobile gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "10.3.1.716"
      },
      {
        "model": "helix universal mobile gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "10.1.1.120"
      },
      {
        "model": "helix universal gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "9.0.2.881"
      },
      {
        "model": "helix universal gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "9.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11352"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iDEFENSE Security Advisory\u203b labs@idefense.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0774",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0774",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-9204",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0774",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200411-022",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9204",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RealNetworks Helix Universal Server 9.0.2 for Linux and 9.0.3 for Windows allows remote attackers to cause a denial of service (CPU and memory exhaustion) via a POST request with a Content-Length header set to -1.  The problem surrounds the mishandling of some POST headers values. \nAn attacker can exploit this issue to cause the affected server to consume excessive computer resources and hang, denying service to legitimate users. BACKGROUND\n\nRealNetworks Helix Universal Server is a universal digital media\ndelivery platform with industry leading performance, integrated content\ndistribution and Web services support. More information is available at\nhttp://www.realnetworks.com. \n\nII. \n\nThe problem specifically exists in the handling of specially crafted\nPOST requests. Generating a request with the Content-Length header set\nto -1 triggers an integer handling error resulting in mass utilization\nof memory and CPU time. \n\nIII. ANALYSIS\n\nAny unauthenticated remote attacker can exploit this vulnerability,\nwhich causes the affected system to utilize mass amounts of memory and\nCPU time. The system will no longer be able to process future requests. \n\nThe affected server must be restarted in order to resume normal\nfunctionality. \n\nIV. DETECTION\n\niDEFENSE has confirmed the existence of this vulnerability in\nRealNetworks Helix Server version 9.0.2 for Linux and version 9.0.3 for\nWindows. It is suspected that earlier versions on both platforms are\nvulnerable as well. \n\nV. WORKAROUND\n\nUsage of an inline application level filter can help mitigate risk of\nexploitation by scanning for and filtering invalid Content-Length\nparameters. \n\nVI. VENDOR RESPONSE\n\n\"Customers are encouraged to upgrade their Server software to the latest\nversion, which contains a security patch.\"\n\nRealNetworks has released binaries that guard against the described\nvulnerability. The related advisory from RealNetworks is available at:\n\n    http://service.real.com/help/faq/security/security100704.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CAN-2004-0774 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n07/01/2004   Initial vendor notification\n07/01/2004   iDEFENSE clients notified\n08/05/2004   Initial vendor response\n10/07/2004   Coordinated public Disclosure\n\nIX. CREDIT\n\nThe discoverer of this vulnerability wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nX. LEGAL NOTICES\n\nCopyright (c) 2004 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.netsys.com/full-disclosure-charter.html\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      },
      {
        "db": "BID",
        "id": "11352"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "db": "PACKETSTORM",
        "id": "34615"
      }
    ],
    "trust": 1.35
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9204",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0774",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "17648",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20041007 REALNETWORKS HELIX SERVER CONTENT-LENGTH DENIAL OF SERVICE VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "11352",
        "trust": 0.4
      },
      {
        "db": "PACKETSTORM",
        "id": "34615",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-9204",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "db": "BID",
        "id": "11352"
      },
      {
        "db": "PACKETSTORM",
        "id": "34615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "id": "VAR-200411-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:53:48.915000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://www.idefense.com/application/poi/display?id=151\u0026type=vulnerabilities"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17648"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/17648"
      },
      {
        "trust": 0.3,
        "url": "http://www.real.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.service.real.com/help/faq/security/security100704.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=151\u0026amp;type=vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "http://lists.netsys.com/full-disclosure-charter.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0774"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      },
      {
        "trust": 0.1,
        "url": "http://service.real.com/help/faq/security/security100704.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.realnetworks.com."
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "db": "BID",
        "id": "11352"
      },
      {
        "db": "PACKETSTORM",
        "id": "34615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "db": "BID",
        "id": "11352"
      },
      {
        "db": "PACKETSTORM",
        "id": "34615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-11-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "date": "2004-10-07T00:00:00",
        "db": "BID",
        "id": "11352"
      },
      {
        "date": "2004-10-13T06:46:28",
        "db": "PACKETSTORM",
        "id": "34615"
      },
      {
        "date": "2004-10-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "date": "2004-11-03T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9204"
      },
      {
        "date": "2009-07-12T07:06:00",
        "db": "BID",
        "id": "11352"
      },
      {
        "date": "2006-01-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      },
      {
        "date": "2017-07-11T01:30:27.793000",
        "db": "NVD",
        "id": "CVE-2004-0774"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "34615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RealNetworks Helix Universal Server section POST Request Remote Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-022"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…