Buffer overflow attacks

Buffer overflow attacks overflow a buffer with excessive data. This type of attack allows an attacker to run remote shell on the computer and gain the same system privileges that are granted to the application that is being attacked.

About this attack

An attacker uses buffer overflow attacks to corrupt the execution stack of a web application. The attacker sends carefully crafted input to a web application to force the web application to execute arbitrary code that allows the attacker to take over the system that is being attacked.

Web servers or web applications that manage the static and dynamic aspects of a site, or use graphic libraries to generate images, are vulnerable to buffer overflow attacks. Buffer overflow attacks cause system crashes, might place a system in an infinite loop, or execute code on the system to bypass a security service.

Signatures triggered by this attack

The signatures that are triggered by buffer overflow attacks include:
Table 1. Buffer overflow signatures
Signature name Description More information
HTTP_Accept_Language_Overflow Detects an overflow in the HTTP ACCEPT field.

pam.http.maxaccept: Maximum length of an HTTP accept field.

Type= number
Default value= 1600
Minimum value= 1
Maximum value= 4294967295

IBM® X-Force®: Netscape Enterprise Server contains a buffer overflow in its handling of Accept headers

CVE-1999-0751

HTTP_Apache_DOS Detects an HTTP URL request that contains many slashes /, which might indicate an attempt by an attacker to increase the load average on an Apache httpd server. IBM X-Force: Apache HTTP server beck exploit

CVE-1999-0107

HTTP_Apache_Header_Memory_DoS Detects an attempt to DoS a vulnerable apache HTTP server by using a request with carefully crafted HTTP headers.

pam.http.header.contspace.limit: Maximum space beginning HTTP header continuation.

Type= number
Default value= 100
Minimum value= 0
Maximum value= 4294967295

IBM X-Force: Apache HTTP Server HTTP GET request denial of service

CVE-2004-0942

HTTP_Apache_JK2_Host_Overflow Detects an attack against Apache web servers that support Jakarta Tomcat Connectors (mod_jk2). IBM X-Force: Apache mod_jk2 HTTP Host header buffer overflow

CVE-2007-6258

HTTP_Apache_LF_Memory_DoS Detects an attempt to DoS a vulnerable apache HTTP server by using a request that contains numerous line feed characters. IBM X-Force: Apache HTTP Server LF (Line Feed) denial of service

CVE-2003-0132

HTTP_IIS_Tilde_DoS Detects HTTP URLs that contain a ~ (tilde) followed by a digit.
Known false positives: Any request to a vulnerable server for a URL that contains ~#, where # is any digit, causes this signature to trigger. Servers are assumed vulnerable until there is evidence that they are not vulnerable.
Known false negatives: IBM X-Force believes it to be highly unlikely, although remotely possible, that this vulnerability can be entirely exploited from the Internet. In such cases, accurate detection and association of the setup before you see the pattern associated with this event is not possible.
IBM X-Force: Microsoft Internet Information Services URL parser buffer overflow

CVE-2005-4360

HTTP_LDAP_Mod_Rewrite_BO Checks for an off-by-one buffer overflow in the LDAP scheme handling function. IBM X-Force: Apache mod_rewrite off-by-one buffer overflow

CVE-2006-3747

HTTP_Lighttpd_Header_Overflow Detects HTTP requests that contain long header data that might allow a remote attacker to execute arbitrary code on the victim's system by overflowing a buffer in the mod_fastcgi extension of the Lighttpd server.

pam.http.lighttpd.hdr.limit: Sets the maximum HTTP header size before the HTTP_Lighttpd_Header_Overflow signature is reported.

Type= number
Default value= 0x0000f000
Minimum value= 0x200
Maximum value= 0x7fffffff

IBM X-Force: lighttpd mod_fastcgi code execution

CVE-2007-4727

HTTP_Netscape_Revlog Detects an HTTP REVLOG request, which might indicate an attacker's attempt to crash or otherwise disrupt the service of a Netscape Enterprise web server. IBM X-Force: Netscape Enterprise Server REVLOG denial of service

CVE-2001-0251

HTTP_Oracle2_BO Detects attempts to overflow a buffer within Oracle Application Server by sending large URL parameters in GET requests to default AS ports. IBM X-Force: Oracle Application Server emagent.exe buffer overflow
HTTP_PHPNuke_Index_File Detects an HTTP URL that contains the string */*.php and that also has an argument that begins with file=http:. IBM X-Force: PHP-Nuke index.php allows remote attackers to execute arbitrary commands from an included file

CVE-2002-0206

HTTP_PHPNuke_ModulesPhp_DOS Detects an HTTP URL that contains the string */modules.php and that also has a query string that begins with op=modload&name=../&file=modules. IBM X-Force: PHP-Nuke modules.php remote denial of service
HTTP_PHPNuke_Prefix_Admin Detects an HTTP URL that contains the string */*.php and that also has a query string that begins with prefix=*. IBM X-Force: PHP-Nuke $prefix variable could allow a remote attacker to gain administrative access

CVE-2001-1025

HTTP_POST_repeated_char Detects HTTP POST data that contains a repeated character. This trigger might indicate an attacker's attempt to overflow a buffer and execute arbitrary code. IBM X-Force: HTTP POST contains repeated characters
HTTP_Tomcat_URI_Overflow Detects a URI of at least 4096 characters in an HTTP request that might be going to a Tomcat server. IBM X-Force: Apache Tomcat JK Web Server Connector map_uri_to_worker() buffer overflow

CVE-2007-0774

HTTP_URL_repeated_char Detects URLs that have many consecutive, identical characters. Such sequences can indicate an attacker's attempt to overflow a buffer.

pam.name.maxrepeatedchar: Maximum repeated character for a number of events.

Type= number
Default value= 100
Minimum value= 2
Maximum value= 2147483647

IBM X-Force: HTTP URL contains repeated characters
HTTP_WebDAV_Long_Rqst_DOS Detects a specific HTTP URL.

This signature searches for an HTTP WebDAV method PROPFIND or SEARCH with a content-type of 'text/xml' and a content-length of greater than 48000 bytes.

This signature replaces HTTP_WebDAV_Overflow.

IBM X-Force: Microsoft IIS WebDAV long invalid request denial of service

CVE-2001-0508

HTTP_WebDAV_XML_Attribute_DoS Detects a WebDav command with an unusually large number of XML attributes. This trigger might indicate an attempt to cause a denial of service on some IIS web servers. IBM X-Force: Microsoft Internet Information Server WebDAV multiple attributes per XML elements cause denial of service

CVE-2003-0718