Skip to content

Proof-of-concept for overflow and resulting memory leak in TinyWeb 1.94

Notifications You must be signed in to change notification settings

DMCERTCE/PoC_Tiny_Overflow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

PoC_Tiny_Overflow

Proof-of-concept for a heap overflow and memory leak in TinyWeb 1.94 - All versions most likely affected.

Failure to properly validate the HTTP Request Method and other request fields allows a attacker to target the server by sending a large payload. The underlying session thread will terminate with runtime error 203 (Heap Overflow) and subsequently cause a memory leak in the main application.

It is possible to consume all 2GB of the 32-bit application leading to an all-out DoS.

PoC Script contains code to demonstrate the attack. Notice that timeout may differ according to available bandwidth. Script takes ip - port as argument.

I take no responsibility in how you use the supplied code.

image image image

About

Proof-of-concept for overflow and resulting memory leak in TinyWeb 1.94

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages