lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: 3APA3A at SECURITY.NNOV.RU (3APA3A)
Subject: The Bat! 2.01 memory corruption

Dear bugtraq,

AGK (agk at sandy.ru) discovered The Bat! 2.01 to throw exception on few
messages.  It  looks  like The Bat! 2.01 in standard configuration (with
build-in  PGP  support)  has  a  bug with processing PGP signed messages
(protocol="application/pgp-signature")    with    multiple   recursively
included  parts. I did not any debugging and problem may be in something
else, but changing layout of parts and signatures makes The Bat! to read
_and  write_ different unallocated memory regions, potentially it may be
exploitable  to  code execution. Because The Bat! has it's own exception
handler, application does not crash.

Vendor  (RitLabs)  was  contacted and replied he was unable to reproduce
this  bug  in  2.03  Beta  and  latest release 2.02 CE is _probably_ not
vulnerable   to.  I  did  not  any  validation.  1.x  versions  are  not
vulnerable.

Example of message attached.

-- 
http://www.security.nnov.ru
         /\_/\
        { , . }     |\
+--oQQo->{ ^ }<-----+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
                    |/
-------------- next part --------------
An embedded message was scrubbed...
From: "Test"
Subject: no subject
Date: 31 Dec 2003 23:42:47 +0300
Size: 1832
Url: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040116/41813bc4/batcrash.mht

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ