{"vuid":"VU#191763","idnumber":"191763","name":"iPlanet Web Server Enterprise Edition and Netscape Enterprise Server malformed Web Publisher command causes denial-of-service","keywords":["Netscape Enterprise Server","DoS","denial of service","web publishing commands","?wp-*","?wp-html-rend","iWS service","PR01-04","web publisher","web publishing","sun"],"overview":"A vulnerability exists in iPlanet Web Server, Enterprise Edition and Netscape Enterprise Server in which a malformed Web Publisher command can crash the web server process. This vulnerability only affects Windows NT based servers.","clean_desc":"ProCheckup has reported a vulnerability in iPlanet Web Server, Enterprise Edition and Netscape Enterprise Server running on Windows NT based operating systems. The iPlanet and NES servers provide a feature called Web Publisher. According to NES documentation: Netscape Enterprise Server 4.0 clients can use Web Publisher to collaborate on projects by directly accessing, editing, and managing file on remote servers. Web Publisher provides sophisticated features for server clients, such as file management, editing and publishing, and access control. If Web Publishing is enabled, a malformed ?wp-html-rend command can crash the web server process. To determine if Web Publisher is enabled, enter the following URL: http://<name of server>/publisher\nIf Web Publisher is enabled, a page should appear. Note that  this vulnerability does not affect Unix systems.","impact":"An unauthenticated remote attacker can cause a denial-of-service condition by sending malformed ?wp-html-rend commands to a vulnerable server.","resolution":"Disable Web Publishing\niPlanet recommends disabling Web Publisher and Directory Indexing on external servers: <dl> <dd> <a href=\"http://developer.netscape.com/docs/manuals/enterprise/40/ag/esapuirf.htm#1005372\"> http://developer.netscape.com/docs/manuals/enterprise/40/ag/esapuirf.htm#1005372</a>\n</dl>\n</dd>\nAnother method for disabling Web Publisher is to use a Netscape Server Application Programming Interface (NSAPI) Server Application Function (SAF): <dl> <dd> <a href=\"http://knowledgebase.iplanet.com/ikb/kb/articles/7761.html\"> http://knowledgebase.iplanet.com/ikb/kb/articles/7761.html</a>\n</dl>\n</dd>","workarounds":"Filter HTTP Traffic\nIt may be possible to use an application layer filter to detect and block HTTP requests containing the ?wp-html-rend command.","sysaffected":"","thanks":"The CERT Coordination Center thanks \nProCheckup for information used in this document.","author":"This document was written by Art Manion.","public":["http://www.procheckup.com/vuln.html","http://knowledgebase.iplanet.com/ikb/kb/articles/7761.html","http://developer.netscape.com/docs/manuals/enterprise/40/ag/eswebpub.htm","http://enterprise.netscape.com/docs/enterprise/60/admin/esintro.htm#1009005"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-09T15:55:42Z","publicdate":"2002-01-08T00:00:00Z","datefirstpublished":"2002-01-08T17:11:11Z","dateupdated":"2002-01-09T19:25:36Z","revision":23,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"12","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"10","cam_impact":"5","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.5","cam_scorecurrentwidelyknown":"10.5","cam_scorecurrentwidelyknownexploited":"18","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.5,"vulnote":null}