From: Gary Oleary-Steele (garyo@sec-1.com)
Date: Tue Jul 03 2007 - 09:15:47 EDT
Buffer Truncation Abuse in Microsoft SQL Server Based Applications
Release Date: 3rd July 2007
Author: Gary O'Leary-Steele
Web Site: www.sec-1.com
This paper is designed to document an attack technique Sec-1 recently
adopted during the course of their application assessments. The basic
principal of this technique has existed for some time; however we hope
this paper we will provide an insight of how a variation of the
technique can be adopted to attack common "forgotten password"
functionality within web applications.
Our initial intention was to release this paper along with a case study
demonstrating the flaw within a commercial application. However since
the vendor has yet to fix the flaw it was decided that an initial
censored release will be followed up with the complete release further
down the line.
The paper can be downloaded here:
http://www.sec-1labs.co.uk/papers/BTA_CensoredRelease.pdf
Sec-1 specialises in the provision of network security solutions.
For more information on products and services we offer visit
www.sec-1.com
or call
0113 257 8955.
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Swap Out your SPI or Watchfire app sec solution for
Cenzic's robust, accurate risk assessment and management
solution FREE - limited Time Offer
http://www.cenzic.com/wf-spi
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:55 EDT