lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040629120143.GA8085@grok.org.uk>
From: johnc at grok.org.uk (John Cartwright)
Subject: DoS in popclient 3.0b6

DoS in popclient 3.0b6
----------------------

Release Date: 29th June 2004
Discovery: Dean White <incidents@...guard.com>
Research: John Cartwright <johnc@...k.org.uk>

Overview
--------

"popclient is a Post Office Protocol compliant mail retrieval client 
which supports both POP2 (as specified in RFC 937) and POP3 (RFC 1725)."

An off-by-one condition exists in the POP3 handler code present in 
this application. By crafting a malicious email a remote attacker may 
cause a denial of service against users of this software.

Detail
------

The problem occurs in pop3.c, function 'POP3_readmsg':

	int POP3_readmsg (socket,mboxfd,topipe)
	int socket;
	int mboxfd;
	int topipe;
	{ 
[1]	  char buf [MSGBUFSIZE]; 
	  char *bufp;
	  char savec;
	  char fromBuf[MSGBUFSIZE];
	  int needFrom;
	  int lines,sizeticker;
	  time_t now;
	  /* This keeps the retrieved message count for display purposes */
	  static int msgnum = 0;  
	
	  /* set up for status message if outlevel allows it */
	  if (outlevel > O_SILENT && outlevel < O_VERBOSE) {
	    fprintf(stderr,"reading message %d",++msgnum);
	    /* won't do the '...' if retrieved messages are being sent to stdout */
	    if (mboxfd == 1)
	      fputs(".\n",stderr);
	    else
	      ;
	  }
	  else
	    ;
	
	  /* read the message content from the server */
	  lines = 0;
	  sizeticker = MSGBUFSIZE;
	  while (1) {
[2]	    if (SockGets(socket,buf,sizeof(buf)) < 0)
	      return(PS_SOCKET);
	    bufp = buf;
	    if (*bufp == '.') {
	      bufp++;
	      if (*bufp == 0)
	        break;  /* end of message */
	    }
[3]	    strcat(bufp,"\n");

A buffer of size MSGBUFSIZE is declared at [1]. At [2], the function 
SockGets is called, which returns a line of input from the message 
into this buffer. In the case of a long line, this will return at 
maximum a string of (MSGBUFSIZE - 1) characters plus the null 
terminator required. 

In this case, then the strcat is performed at [3], the null is 
overwritten with the '\n' character, and a new null is placed one byte
after the buffer, partially overwriting the saved stack pointer.

When the function returns this leads to an application crash, however
there does not appear to be any possibility of influencing this 
behaviour to cause anything other than a DoS.

Workaround
----------

The call to SockGets at [2] should use (sizeof(buf)-1) for the third 
parameter so that bounds are not overrun when the newline is applied.

Notes
-----

- Whilst symptoms of this problem were discussed as far back as 1998,
  there does not appear to be any (publicly available) research into, 
  or fix for, this DoS.
- popclient 3.0b6 code was sourced from the OpenBSD ports tree.
- Thanks to Len Rose/Netsys.com for the continued long-time support!

This advisory will be archived at 
http://www.grok.org.uk/advisories/popclient.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ