[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030910070613.6889.qmail@web13408.mail.yahoo.com>
Date: Wed, 10 Sep 2003 00:06:13 -0700 (PDT)
From: Phuong Nguyen <dphuong@...oo.com>
To: bugtraq@...urityfocus.com
Subject: Gordano Messaging Suite - Multiple Vulnerabilities
Release Date: 09/04/2003
TITLE
=====
Gordano Messaging Suite � Multiple Vulnerabilities
DESCRIPTION
===========
�Gordano Messaging Suite is the powerful messaging
server running on Windows, Linux, Solaris and AIX. It
is being used by over twenty four thousand customers,
in more than ninety countries, covering all sectors
(Airlines, Press, Government Agencies, Education,
Industry, etc..)�
Gordano Messaging Suite is being widely used by some
major organizations such as Compaq, Xerox, NASA, Cisco
System, AT&T, FedEx etc�
More information at http://www.gordano.com
PROBLEMS
=========
Version : Gordano Messaging Suite version 9, build
3138 (latest build)
Tested Platform : Windows 2000, Windows XP
Professional, Linux(x86)
Multiple vulnerabilities in Gordano Messaging Suite
(GMS) result in DoS attack and information disclosure
(usernames, login time, domains, etc�).
DETAILS
=======
[Vulnerability #1] Remote DoS
x:\<Gordano Path>/bin/WWW.exe listens on the following
ports to provide GMS Administration, WebMail
Professional, WebMail Express, WebMail Mobile, Instant
Messaging, and Web Server services to users: 80, 8000,
8025, 8081, 8888, 9000.
When a user sending a request like this /../.. to GMS
Web Server at port 80 will cause www.exe process
terminated and all services that WWW.exe provides are
shutdown immediately.
~$ telnet 192.168.1.69
Trying 192.168.1.69...
Connected to 192.168.1.69
Escape character is '^]'.
GET /../.. HTTP/1.0
Connection closed by foreign host.
On Linux, the vulnerability doesn�t cause the
/gordano/bin/WWW process terminated but it never times
out and if an attacker opens up like 15-20 connections
sending /../.. requests it will probably enough to
keep GMS Server busy and deny providing services to
other legitimate users.
Restarting the service is needed in order to gain
normal functionality.
[Vulnerability #2] Information Disclosure [require
valid user credential]
Alertlist.mml provides information about users who
have logged in to the GMS Server and discloses some
useful information to the attackers such as usernames,
domains, logged in time, etc�. and it�s supposed to be
accessed by GMS Server's Administrator only but a
normal WebMail user can also access to that script
without the need of login as an admin.
http://www.victim.com:8000/admin/reports/alertlist.mml
VENDOR STATUS
==============
Vendor has verified the issues and click on the
following links to download the patch.
Linux platform :
ftp://ftp.gordano.com/gms/3138/hotfixes/h20030905/linux/www_h20030905.zip
Windows platform :
ftp://ftp.gordano.com/gms/3138/hotfixes/h20030905/windows/www_h20030905.zip
Author: Phuong Nguyen
__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com
Powered by blists - more mailing lists