R
RSoIsCaIrLiIoA
while i read bugtraq i see this post:
if buffer!=0 where are or what are here "Vulnerable for format
strings"
if buffer==0 this should segfault or write nothing
same here
i don't understand how can execute "Arbitrary Code"
Mailing-List: contact (e-mail address removed); run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:[email protected]>
List-Help: <mailto:[email protected]>
List-Unsubscribe: <mailto:[email protected]>
List-Subscribe: <mailto:[email protected]>
Date: 27 Apr 2006 08:24:25 -0000
Message-ID: <[email protected]>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
From: (e-mail address removed)
Subject: BL4's SMTP server BufferOverflow Vulnerable
Organization: Newsgate at muc.de e.V.
Newsgroups: muc.lists.bugtraq
Path: reader4.news.tin.it!spool.news.tin.it!feeder.news.tin.it!82.182.32.53.MISMATCH!usenet.ath.cx!news.ispa.de!newsfeed.freenet.de!ecngs!feeder2.ecngs.de!news.osn.de!diablo2.news.osn.de!news.belwue.de!news-peer.in.tum.de!news.muc.de!newsgate.muc.de!not-for-mail
Approved: (e-mail address removed)
X-Newsgate-CVS-Id: $Id: newsgate.pl,v 1.9 2003/07/21 20:04:07 ag Exp ag $
Distribution: world
Lines: 138
Xref: reader4.news.tin.it muc.lists.bugtraq:12117
---------------------------------------------------------------------------
[ECHO_ADV_30$2006] BL4's SMTP server BufferOverflow Vulnerable
---------------------------------------------------------------------------
Author : Dedi Dwianto
Date : April, 27th 2006
Location : Indonesia, Jakarta
Web : http://advisories.echo.or.id/adv/adv30-theday-2006.txt
Critical Lvl : High
---------------------------------------------------------------------------
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Application : BL4's SMTP server
version : < 0.1.5
URL : http://bl4qkubartnndfhr.emmeya.com/prog/smtp?0
Description :
BL4's SMTP server is an inbound only SMTP server.
It currently uses hardcoded values for handling email.
The SMTP server puts the incoming email into various text files.
---------------------------------------------------------------------------
Vulnerability:
~~~~~~~~~~~~~~~~
BL4's SMTP server is to a flaw that can allow remote attacker to
cause a denial of service or a attacker can Execution of Arbitrary Code.
The vulnerability is due to a buffer overflow in the SMTP service.
A remote attacker can repeatedly send more that 2100 bytes as the
argument to the HELO, MAIL FROM, and RCPT TO commands
to crash the server.
------------------think.c-----------------------------------
...........
{
slaveEmail[x]->isData = 0;
slaveEmail[x]->emailFrom = 0;
slaveEmail[x]->emailTo = 0;
free(buffer);
buffer = malloc(sizeof(char) * 12);
sprintf(buffer, "250 OK\r\n");
return buffer;
}
free(buffer);
.............
slaveEmail[x]->EHLO = buffer;
slaveEmail[x]->EHLOtrue = 1;
buffer = malloc(sizeof(char) * 12);
sprintf(buffer, "250 OK\r\n");
return buffer;
-----------------------------------------------------------
--
sprintf(buffer, "250 OK\r\n");
--
Vulnerable for format strings.
if buffer!=0 where are or what are here "Vulnerable for format
strings"
if buffer==0 this should segfault or write nothing
--
free(buffer);
buffer = malloc(sizeof(char) * 12);
--
Vulnerable for buffer overflow.
same here
A attacker can create Arbitrary Code here .
i don't understand how can execute "Arbitrary Code"