Multiple Vulnerabilities in SLWebmail

From: NGSSoftware Insight Security Research (
Date: 05/07/03

  • Next message: NGSSoftware Insight Security Research: "Multiple Buffer Overflow Vulnerabilities in SLMail (#NISR07052003A)"
    To: <>, <>, <>
    Date: Wed, 7 May 2003 18:05:18 +0100

    NGSSoftware Insight Security Research Advisory

    Name: Multiple Vulnerabilities in SLWebMail
    Systems Affected: SLWebMail 3 on Windows
    Severity: High Risk
    Vendor URL:
    Authors: David Litchfield (
     Mark Litchfield (
    Date: 7th May 2003
    Advisory URL:
    Advisory number: #NISR07052003B

    SLWebMail is a web based e-mail system that runs on top of Microsoft's
    Internet Information Server. It is vulnerable to many different kinds of
    issues, such as buffer overflows, arbitrary file access and physical path


    Buffer Overflows
    Many of the ISAPI DLL applications that form SLWebmail are vulnerable to
    buffer overflow vulnerabilities. By passsing an overly long value for
    certain parameters in the query string the overflows can be triggered.

    Module: showlogin.dll
    Parameter: Language

    Module: recman.dll
    Parameter: CompanyID

    Module: admin.dll
    Parameter: CompanyID

    Module: globallogin.dll
    Parameter: CompanyID

    Abritrary File Access
    ShowGodLog.dll can be accessed without requiring a remote user to
    authenticate. This ISAPI application is used to show SLWebMail's log file.
    However, by providing the path, relative or full, to any file that the
    anonymous Internet account has read access to then access to the contents
    can be gained, even outside of the web root.

    Physical Path Revelation
    By making invalid requests to certain DLLs such as WebMailReq.dll the
    complete physical path to the DLL is revealed. This information can be used
    to help with other attacks.

    Fix Information
    NGSSoftware alerted SLMail to these issues in February and an update has
    been released. See for more details.

    A check for these issues has been added to Typhon, a comprehensive automated
    vulnerability assessment tool of which more information is available from
    the NGSSite:

    About NGSSoftware
    NGSSoftware design, research and develop intelligent, advanced application
    security assessment scanners. Based in the United Kingdom, NGSSoftware have
    offices in the South of London and the East Coast of Scotland. NGSSoftware's
    sister company NGSConsulting, offers best of breed security consulting
    services, specialising in application, host and network security

    Telephone +44 208 401 0070
    Fax +44 208 401 0076

  • Next message: NGSSoftware Insight Security Research: "Multiple Buffer Overflow Vulnerabilities in SLMail (#NISR07052003A)"

    Relevant Pages