lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 10 Sep 2003 00:06:13 -0700 (PDT)
From: Phuong Nguyen <dphuong@...oo.com>
To: bugtraq@...urityfocus.com
Subject: Gordano Messaging Suite - Multiple Vulnerabilities


Release Date: 09/04/2003 

TITLE 
===== 
Gordano Messaging Suite � Multiple Vulnerabilities 

DESCRIPTION 
=========== 
�Gordano Messaging Suite is the powerful messaging
server running on Windows, Linux, Solaris and AIX. It
is being used by over twenty four thousand customers,
in more than ninety countries, covering all sectors 
(Airlines, Press, Government Agencies, Education,
Industry, etc..)� 

Gordano Messaging Suite is being widely used by some
major organizations such as Compaq, Xerox, NASA, Cisco
System, AT&T, FedEx etc� 

More information at http://www.gordano.com 

PROBLEMS 
========= 
Version : Gordano Messaging Suite version 9, build
3138 (latest build) 
Tested Platform : Windows 2000, Windows XP
Professional, Linux(x86) 

Multiple vulnerabilities in Gordano Messaging Suite
(GMS) result in DoS attack and information disclosure
(usernames, login time, domains, etc�). 

DETAILS 
======= 
[Vulnerability #1] Remote DoS 

x:\<Gordano Path>/bin/WWW.exe listens on the following
ports to provide GMS Administration, WebMail
Professional, WebMail Express, WebMail Mobile, Instant
Messaging, and Web Server services to users: 80, 8000,
8025, 8081, 8888, 9000. 

When a user sending a request like this /../.. to GMS
Web Server at port 80 will cause www.exe process
terminated and all services that WWW.exe provides are
shutdown immediately. 

~$ telnet 192.168.1.69 
Trying 192.168.1.69... 
Connected to 192.168.1.69 
Escape character is '^]'. 
GET /../.. HTTP/1.0 

Connection closed by foreign host. 

On Linux, the vulnerability doesn�t cause the
/gordano/bin/WWW process terminated but it never times
out and if an attacker opens up like 15-20 connections
sending /../.. requests it will probably enough to
keep GMS Server busy and deny providing services to
other legitimate users. 

Restarting the service is needed in order to gain
normal functionality. 

[Vulnerability #2] Information Disclosure [require
valid user credential] 

Alertlist.mml provides information about users who
have logged in to the GMS Server and discloses some
useful information to the attackers such as usernames,
domains, logged in time, etc�. and it�s supposed to be
accessed by GMS Server's Administrator only but a
normal WebMail user can also access to that script
without the need of login as an admin.
http://www.victim.com:8000/admin/reports/alertlist.mml


VENDOR STATUS 
============== 
Vendor has verified the issues and click on the
following links to download the patch. 

Linux platform :
ftp://ftp.gordano.com/gms/3138/hotfixes/h20030905/linux/www_h20030905.zip

Windows platform :
ftp://ftp.gordano.com/gms/3138/hotfixes/h20030905/windows/www_h20030905.zip


Author: Phuong Nguyen 

__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ