<<< Date Index >>>     <<< Thread Index >>>

RhinoSoft DNS4ME HTTP Server Vulnerabilities



##########################################################
# GulfTech Security Research          September, 16th 2004
##########################################################
# Vendor  : RhinoSoft
# URL     : http://www.dns4me.com/
# Version : RhinoSoft.com DNS4Me Web Server/3.0.0.4
# Risk    : Cross Site Scripting && Denial of service
##########################################################


Description:
DNS4Me is the dynamic DNS service that you need to 
start hosting your own Internet services. When you have 
a dynamic IP address, you need something to associate a 
static domain name with it to make it easier for visitors 
to access the services you provide. With DNS4Me, you can 
take control of your Web site by running your own HTTP 
server. Without a hosting company, you've eliminated the 
cost of hosting as well as a layer of contact between you 
and your Web site. This gives you unparalleled control 
overits configuration, content, and delivery. But the 
benefits of dynamic DNS aren't just for HTTP servers. Any 
service that can make use of a domain name can benefit from 
DNS4Me. This includes FTP servers, e-mail servers, daemons 
for today's popular computer games, NetMeeting. With the 
reliability and excellent support you've come to expect of 
RhinoSoft.com backing up DNS4Me, you'll get a powerful, no 
hassle dynamic DNS solution. The RhinoSoft DNS4ME HTTP server
is prone to multiple vulnerabilities, and users are encouraged
to upgrade as soon as possible.



Cross Site Scripting:
It is possible for an attacker to render malicious code in 
a victims browser by sending them a url to request a 
document on the server(s), which contains A malformed query 
string. 

http://127.0.0.1/?%3E%3Cscript%3Ealert('XSS')%3C/script%3E

Any code in the query string will be executed and cause 
cross site scripting.



Denial of Service:
RhinoSoft.com DNS4Me Web Server is vulnerable to Denial Of 
Service attacks. If a malicious user sends a large amount 
of data to port 80, or the port that the DNS4Me Web Server 
is running on, it will send the CPU usage to 99% and 
eventually crash the affected server. 



Solution:
The developers were contacted last month about these issues. 
They said they needed a month to resolve them. It has been 
one month so users should check their website for an update. 
Also, the RhinoSoft HTTP server may be included in other 
RhinoSoft apps as well. Not sure of this, but something for 
other researchers to look out for.



Related Info:
The original advisory can be found at the following location 
http://www.gulftech.org/?node=research&article_id=00049-09162004



Credits:
James Bercegay of the GulfTech Security Research Team