exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CISADV000504.txt

CISADV000504.txt
Posted May 17, 2000
Authored by David Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory (CISADV000504) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Netwin's (https://netwinsite.com) DMailWeb (dmailweb/dmailweb.exe v2.5d), CGI program designed to give access to a user's SMTP and POP3 server over the world wide web. By supplying a specially formed QUERY_STRING to the program a buffer is overflowed allowing execution of arbitrary code compromising the web server.

tags | exploit, web, overflow, arbitrary, cgi
SHA-256 | 47a0edd015b1f01cce3d508c12cc5b2cf7330ba998a12a9c7aaf7acfd187723d

CISADV000504.txt

Change Mirror Download
Cerberus Information Security Advisory (CISADV000504)
https://www.cerberus-infosec.co.uk/advisories.shtml

Released : 4th May 2000
Name : Dmailweb Buffer Overflow
Affected Systems : *nix/Win32 Web Servers running
Issue : Attackers can remotely execute arbitrary code
Author : David Litchfield (mnemonix@globalnet.co.uk)

Description
***********
The Cerberus Security Team has found a remotely exploitable buffer overrun
in Netwin's (https://netwinsite.com) DMailWeb (dmailweb/dmailweb.exe v2.5d),
CGI program designed to give access to a user's SMTP and POP3 server over
the world wide web. By supplying a specially formed QUERY_STRING to the
program a buffer is overflowed allowing execution of arbitrary code
compromising the web server.


Details
*******
The problem stems from an overly long "utoken" parameter. This overflow is
simple to exploit by overwriting the saved return address with an address
that contains a "jmp esp" or "call esp" - the remainder of the the
QUERY_STRING is pointed to by the ESP. Over 1400 bytes is available for
exploit code.

Solution
********
Netwin has made available a patch for this available from their ftp server:
ftp://ftp.netwinsite.com/pub/dmailweb/beta/
Obtain the 2.5e version required for your system.

A check for this has been added to our security scanner, CIS. More details
about CIS can be found on our web site:
https://www.cerberus-infosec.co.uk/

Vendor Status
*************
Netwin were alerted to this on the 3rd May 2000. Cerberus would like to
thank everyone involved for their prompt response.

About Cerberus Information Security, Ltd
*****************************************
Cerberus Information Security, Ltd, a UK company, are specialists in
penetration testing and other security auditing services. They are the
developers of CIS (Cerberus' Internet security scanner) available for free
from their website: https://www.cerberus-infosec.co.uk

To ensure that the Cerberus Security Team remains one of the strongest
security audit teams available globally they continually research operating
system and popular service software vulnerabilites leading to the discovery
of "world first" issues. This not only keeps the team sharp but also helps
the industry and vendors as a whole ultimately protecting the end consumer.
As testimony to their ability and expertise one just has to look at exactly
how many major vulnerabilities have been discovered by the Cerberus Security
Team - over 70 to date, making them a clear leader of companies offering
such security services.

Founded in late 1999, by Mark and David Litchfield, Cerberus Information
Security, Ltd are located in London, UK but serves customers across the
World. For more information about Cerberus Information Security, Ltd please
visit their website or call on +44(0)208 395 4980.

Permission is hereby granted to copy or redistribute this advisory but only
in its entirety.

Copyright (C) 2000 by Cerberus Information Security, Ltd
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close