lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 21 Apr 2004 11:11:55 -0700
From: "Drew Copley" <dcopley@...e.com>
To: <bugtraq@...urityfocus.com>
Subject: EEYE: Yahoo! Mail Account Filter Overflow Hijack


"Yahoo! Mail" Account Filter Overflow Hijack

Release Date:
April 19, 2004

Date Reported:
March 10, 2004

Severity:
High

Vendor:
Yahoo!

Description:
"Yahoo! Mail" is one of the Internet's most popular 
web based email solutions. They provide free email and 
large capacity storage, as well as subscription-based 
services such as mail forwarding, expanded storage and 
personalized email addresses. 

eEye Digital Security has discovered a security hole in 
"Yahoo! Mail" which allows a remote attacker to take over 
an account remotely by sending a specially crafted email.

Technical Description:
-----------EXAMPLE EMAIL---------

SCRIPT
[->a bunch of chars here [spaces are most stealth], the whole 
file size will be just about 100KB]
[this causes the filter to not work... the code is then run 
automatically]


---------------------------------

The pseudo-diagram above explains the scenario rather well. 
For whatever reason, Yahoo's email filter simply does not 
work on files which exceed a certain range. This kind of 
software issue is relatively common. 

A remarkable note about this bug is that no one seems to 
have found it before. 

As far as anyone knows.



Drew's Happy-Happy Quote for the Day:

Ben Franklin, "Three can keep a secret if two are dead."

Protection:
Yahoo! Mail is a hosted, web based service, hence users 
do not need to patch. Yahoo has already fixed this bug, 
therefore all Yahoo accounts are now completely safe from
it.

Vendor Status:
Yahoo! has been notified and has rectified the issue.

Credit:
Drew Copley, eEye Digital Security (dcopley eeye.com), Research Engineer
thanks to "http-equiv" for additional research

Related Links:
Retina Network Security Scanner - Free 15 Day Trial 
http://www.eeye.com/html/Products/Retina/download.html

Greetings:
To all of you out there that don't use turn signals. 
Sooner or later your time is going to come. And a special 
greeting to all of these competitors of ours making some extra 
cash by selling pre-fix vulnerabilities through pay for play 
"mailing lists". I am sure North Korea, the Yakuza, the 
"Triads", the Russian Mafiya, La Costa Nostra, and every 
other criminal state or organization appreciates your type of 
"Partial Full Disclosure for a Darn Good Price" motto.

Copyright (c) 1998-2004 eEye Digital Security
Permission is hereby granted for the redistribution of this 
alert electronically. It is not to be edited in any way without 
express consent of eEye. If you wish to reprint the whole or 
any part of this alert in any other medium excluding electronic 
medium, please email alert@...e.com for permission.

Disclaimer
The information within this paper may change without notice. 
Use of this information constitutes acceptance for use in an 
AS IS condition. There are no warranties, implied or express, 
with regard to this information. In no event shall the author 
be liable for any direct or indirect damages whatsoever arising 
out of or in connection with the use or spread of this information. 
Any use of this information is at the user's own risk.

Feedback
Please send suggestions, updates, and comments to:

eEye Digital Security
http://www.eEye.com
info@...e.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ