lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42E181A9.3010602@twilight-hall.net>
Date: Sat, 23 Jul 2005 01:30:49 +0200
From: Raphaël Rigo <ml-bugtraq@...light-hall.net>
To: bugtraq@...urityfocus.com
Subject: GoodTech SMTP server 5.16 RCPT TO command remote buffer overflow


            Arbitrary code execution in GoodTech's SMTP server

                       discovered by Raphaël Rigo

Product: SMTP server by GoodTech Systems
Affected Version: 5.16 Evaluation (verified), <= regged and 5.15 probably too
Not affected Version: 5.17
OS affected: All WinNT (NT/2K/XP/2K3)
Risk: Critical
Remote Exploit: yes
URL: http://www.goodtechsys.com/smtpdnt2000.asp

Overview
========

The product provides Simple Mail Transfer Protocol (SMTP) to any email client
out of the box. It forwards email messages directly to their recipients.
GoodTech SMTP server runs as a service on the host Windows machine.


Vulnerabilities
===============

         1) Stack overflow in RCPT TO command handling

         Unchecked string copies allow a classic stack overflow.

         Details :
         A cascade of unchecked string copies is responsible for this
         vulnerability :
                - The maximum length of a command is 4096.
                - The requested email is copied without checking nor direct
                consequences into a 2048 bytes buffer.
                - The domain is extracted and copied without checking nor
                direct consequences into a 256 bytes buffer.
                - The following code is executed : sprintf(buf,"mx.%s",domain)
                buf is only 64 bytes long, and can thus be overflowed,
                overwriting a string containing the DNS server to be used to
                find the MX request.
                - This string being non-empty, the following code is executed:
                sprintf(buf1024, "Using DNS Server %s", dnsserver)
                but since we have ~4000 bytes for the domain, this can overflow
                and overwrite the return address of the function, allowing
                arbitrary code execution.

         Risk : Critical
         The attacker may execute arbitrary code with the privileges of the
         SYSTEM user (by default).

         Proof of concept :

         $ telnet localhost 25
         Connected to localhost.
         Escape character is '^]'.
         220 test Simple Mail Transfer Service Ready. Version 5.15 (Evaluation)
         HELO aaa
         250 OK
         RCPT TO: <aa@...'x1100>
         Connection closed by foreign host.

         Service crashes with EIP==0x41414141

         Workaround :
         There is no possible workaround.

         Solution :
         Update to v5.16

         -----------------------------------------------------------------------

         2) Stack overflow in multiple RCPT TO commands handling

         Unchecked string copy allows a classic stack overflow.

         Details :
         For each RCPT TO command, the server fills a 1300 bytes structure
         containing the requested command and the MX server for the requested
         email.
         The server allows up to 99 RCPT TO for a single mail, but the filling
         of this structure is done via unchecked string copy : the command,
         up to 4096 bytes long, is copied without checking into the structure.
         This behaviour allows us to overwrite the return address of the thread
         by issuing a long command in the 99th RCPT TO command.
         We have then to issue a QUIT command to exit the thread and execute
         our code.

         Risk : Critical
         The attacker may execute arbitrary code with the privileges of the
         SYSTEM user (by default).

         Proof of concept :

         $ telnet localhost 25
         Connected to localhost.
         Escape character is '^]'.
         220 test Simple Mail Transfer Service Ready. Version 5.15 (Evaluation)
         HELO aaa
         250 OK
         -- Repeat this part 98 times
         RCPT TO: <aa@aa>
         250 OK
         --
         RCPT TO: <|'A'x2600|@...alhost>
         250 OK
         QUIT
         Connection closed by foreign host.

         Service crashes with EIP==0x41414141

         Workaround :
         There is no possible workaround.

         Solution :
         Update to v5.16

         -----------------------------------------------------------------------

Acknowledgments
===============

Thanks to the developer for quick response and fix.

Timeline
========
2005-07-19        Discovery
2005-07-21        First attempt to contact developer
2005-07-21        Developer reply
2005-07-22        Fixed version released
2005-07-23        Advisory published


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ