Plugin ID | 220 |
Plugin name | Pinnacle ShowCenter BSE web server skin denial of service |
Plugin filename | Pinnacle ShowCenter BSE web server skin denial of service.plugin |
Plugin filesize | 4239 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/10 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Added SecurityTracker ID in version 1.1. Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 8000 |
Plugin procedure exploit | open|send GET /ShowCenter/SettingsBase.php?Skin=ATK HTTP/1.0\n\n|sleep|close|pattern_exists failed to open stream OR No such file or directory in OR loaduserprofile(): Failed opening required OR \Pinnacle\ShowCenter\ |
Plugin exploit accuracy | 90 |
Plugin comment | The server is usually bound to the official address (e.g. 192.168.0.11) and not the loopback address (127.0.0.1). This may affect localhost audits. This plugin does check the attack very accurate but the denial of service is not given directly. |
Bug published name | Marc Ruef |
Bug published email | marc dot ruef at computec.ch |
Bug published web | http://www.computec.ch |
Bug published company | computec.ch |
Bug published date | 2004/09/10 |
Bug advisory | http://www.computec.ch/projekte/atk/ |
Bug affected | Pinnacle ShowCenter |
Bug not affected | Other solutions |
Bug vulnerability class | Denial Of Service |
Bug description | The remote system is running the Pinnacle ShowCenter. This is a straming server that comes with a web GUI that is provided with a HTTP server named BSE. If somebody is able to connect to the ShowCenter, it is possible to start a denial of service attack by defining a non existent skin. Every connection to the target from the host who specified the wrong skin will be terminated by PHP warning and fata error. |
Bug solution | Resetting the skin name by using another HTTP GET request for an existing skin as like http://192.168.0.11:8000/ShowCenter/SettingsBase.php?Skin=DefaultXL does not work. Thus, check the path given in the warning. If this is C:\Programme\Pinnacle\ShowCenter\DocPath/Skin/ATK/Name.inc.php you can copy or rename another profile in the path ATK to provide the needed files. After resetting an existent skin you can delete the temp skin directory. Upgrade the affected software. The server should be deactivated or de-installed if not necessary. To make it harder to find the server the daemon could be configured to listen at another port (e.g. 8081). Try to prevent unwanted connection attempts by filtering traffic with firewalling. Alternation of the application banner can confuse an attacker and let him determine the wrong software. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.computec.ch/projekte/atk/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 3 |
Bug simplicity | 7 |
Bug impact | 7 |
Bug risk | 6 |
Source Security Tracker ID | 1011379 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |