lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 16 May 2004 22:29:08 +1000 From: "MailEnable Sales" <info@...lenable.com> To: <Oliver@...yhat.de>, <bugtraq@...urityfocus.com> Subject: RE: Remote Buffer Overflow in MailEnable HTTPMail Hi, Thanks for the email. This error was not an overflow issue but a bug in the service (i.e. the error would cause the service to stop, but could the exploiter could not exploit this further or run code on the server). A fix for the bug can be found at: http://www.mailenable.com/hotfix Thanks Peter Fregon MailEnable Pty. Ltd. -----Original Message----- From: Oliver@...yhat.de [mailto:Oliver@...yhat.de] Sent: Saturday, 15 May 2004 10:41 PM To: bugtraq@...urityfocus.com Cc: info@...lenable.com Subject: Remote Buffer Overflow in MailEnable HTTPMail Regarding to the heap overflow vulnerability of MailEnable HTTPMail (http://www.securityfocus.com/bid/10312), i installed the latest hotfix (http://mailenable.com/hotfix/MEHTTPS.zip), and found an additional overflow. Sending a request like: c:\telnet localhost 8080 GET / HTTP/1.0 Authorization: A Crashes the services. The overflow seems to occur in the Authorization header variable. A single character will lead to the crash. I did no further research in order to fully exploit this vuln. A more detailed readme can be found on my website: www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt
Powered by blists - more mailing lists