what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ismtpcrash.txt

ismtpcrash.txt
Posted Nov 13, 2002
Authored by K. K. Mookhey | Site nii.co.in

A buffer overflow has been found in the iSMTP Gateway version 5.0.1 by Incognito. By injecting an overly long MAIL FROM: command, the server will crash. The support for the underlying operating system and the gateway software has been discontinued.

tags | overflow
SHA-256 | f204c71e48d4825113845c421b993db385df8737e682da300148cd3825e84ded

ismtpcrash.txt

Change Mirror Download
=================================================
Advisory: Buffer Overflow in iSMTP Gateway
Software: iSMTP Gateway
Severity: Medium-High
Vendor: Incognito Systems https://www.incognito.com
Systems Affected: Banyan VINES
Version: 5.0.1, ?
Type of Vulnerability: Buffer Overflow

Discovered by: K. K. Mookhey (cto@nii.co.in)
Network Intelligence India Pvt. Ltd. https://www.nii.co.in
Advisory Available online at: https://www.nii.co.in/vuln/ismtp.html
=================================================


Background:
==========
iSMTP Gateway is a Mail Gateway software from Incognito Systems. I quote
directly from the vendor's email:
"The iSMTP gateway runs only on the Banyan VINES operating system (or Banyan
ST4NT). Banyan ceased any further development on VINES 2 years ago and has
refused to provide any support on the product for well over a year. Ten
years ago when the iSMTP software was written it was used by virtually every
member of the Fortune 1000, most Universities world-wide and the entire U.S.
military. "


Description:
=========
If a user sends an overly long MAIL FROM: command, the server responds with
a 'Command Unrecognised' response and subsequently crashes. We speculate
that this probably happens when the system tries to make an entry into the
log file or something else of that nature. That the system is able to give a
valid response before crashing implies that the buffer overflow probably
takes place at some later stage of processing the input.
We do not yet know the exact length of the string that needs to follow the
MAIL FROM: command in order to crash the software. We used a string which
consisted of about 4000 'A's
We tested this on version 5.0.1 of the iSMTP software.


Vendor Response:
=============
The vendor notifies us that they have been unable to replicate the error
in the latest version of the software, which is available from
ftp://ftp.incognito.com
We urge any users of iSMTP to verify this for themselves.


Suggested Workarounds:
==================
In case, you are not using the latest version of the software, we strongly
urge you to upgrade immediately. More information on this can be obtained
from customer support at Incognito.


Note:
====
We term the severity as Medium-High because the vendor certifies that most
of the installations are pretty critical. This included the one we did the
testing on. But taking into account the fact this software is far from being
as popular as the other common Mail Servers, any potential exploit would not
have very far reaching consequences.

This advisory is available online at https://www.nii.co.in/vuln/ismtp.html

Sincerely,

K. K. Mookhey
CTO,
Network Intelligence India Pvt. Ltd.
Tel: 91-22-2001530, 2006019
Email: cto@nii.co.in
Web: www.nii.co.in


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close