exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DST2K0003.txt

DST2K0003.txt
Posted Jun 2, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0003 - Buffer Overrun in NAI WebShield SMTP v4.5.44 Management Tool for Microsoft Windows NT v4.0 Server (SP6). Any user who can connect to tcp port 9999 can obtain a copy of the configuration. Secondly, if you pass an oversized buffer of 208 bytes or more within one of the configuration parameters the service will crash overwriting the stack but and the EIP with what ever was passed within the parameter.

tags | exploit, overflow, tcp
systems | windows
SHA-256 | 5230eece683fd72a6c2495b32df00a21a3efe154506ea65502fe723b503ba75a

DST2K0003.txt

Change Mirror Download
================================================================================
Delphis Consulting Plc
================================================================================

Security Team Advisories
[08/05/2000]


securityteam@delphisplc.com
[http://www.delphisplc.com/thinking/whitepapers/]

================================================================================
Adv : DST2K0003
Title : Buffer Overrun in NAI WebShield SMTP v4.5.44 Management Tool
Author : DCIST (securityteam@delphisplc.com)
O/S : Microsoft Windows NT v4.0 Server (SP6)
Product : NAI WebShield SMTP v4.5.44 / v4.5.74
Date : 08/05/2000

I. Description

II. Solution

III. Disclaimer
================================================================================


I. Description
================================================================================

Delphis Consulting Internet Security Team (DCIST) discovered the following vuln-
erability in the NAI Management Agent for WebShield SMTP under Windows NT.

Firstly telneting to a machine which runs the management agent on port 9999 will
allow you to gain the current configuration by executing the command below.

GET_CONFIG<CR>

Secondly if you pass an oversized buffer of 208 bytes or more within one of the
configuration parameters (there may be more) the service will crash overwriting
the stack but and the EIP (208 + 4) with what ever was passed within the parameter.

SET_CONFIG<CR>
Quarantine_Path='Ax208'+ EIP

This enables an attack to execute arbitrary code on host server inheriting the
permissions of account of which the service was running as.


II. Solution
================================================================================

Vendor Contacted: 8-May-2000

Currently there is no vendor patch available but the following are preventative
measures Delphis Consulting Internet Security Team would advice users running
this service to implement.

o Don't allow the service to run as SYSTEM but as a restricted user account.
o Access list port 9999 on the local router or firewall to restrict access
to only required machines.
o Stop the management service.


III. Disclaimer
================================================================================
THE INFORMATION CONTAINED IN THIS ADVISORY IS BELIEVED TO BE ACCURATE AT
THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR
IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE
PUBLISHER ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR RELIANCE
PLACED ON, THIS INFORMATION FOR ANY PURPOSE.
================================================================================
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close