exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MDaemon.txt

MDaemon.txt
Posted Jul 14, 2003
Authored by Dennis Rand | Site Infowarfare.dk

A buffer overflow has been discovered in the IMAP4rev1 MDaemon v6.7.9 and below that can allow malicious users to remotely crash this application and commit code execution with SYSTEM privileges.

tags | advisory, overflow, code execution
SHA-256 | abf6ce1c4d9bf7f8ca7fe731e42afda03ebc4f4ddfc1cbcedb749995121a265c

MDaemon.txt

Change Mirror Download
                     [SELECT]
Buffer Overflow Vulnerability
Found in IMAP4 MDaemon 6
https://www.upstream.se

Discovered by Dennis Rand
www.Infowarfare.dk
------------------------------------------------------------------------


-----[SUMMARY
MDaemon offers a full range of mail server functionality.
MDaemon protects your users from spam and viruses, provides
Full security, includes seamless web access to your email via
WorldClient, remote administration, and much more.

The problem is a Buffer Overflow in the IMAP4 protocol, within the
IMAP4rev1 MDaemon 6.7.9, causing the service to shutdown.
And the exception handler on the stack is overwritten allowing
A system compromise with code execution running as SYSTEM.



-----[AFFECTED SYSTEMS
Vulnerable systems:
* IMAP4rev1 MDaemon 6.7.9

Immune systems:
* IMAP4rev1 MDaemon 6.8.0

-----[SEVERITY
Medium/High - An attacker is able to cause a Buffer Overflow attack on the
IMAP protocol
And the exception handler on the stack is overwritten allowing

A system compromise with code execution running as SYSTEM.
The reason this is also a medium is that and attacker has to
have a
Login on the system to conduct this type of attack.



-----[DESCRIPTION OF WHAT THE VULNERABILITY IS
The Vulnerability is a Buffer Overflow in the IMAP4rev1 MDaemon 6.7.9
When a malicious attacker sends a large amount into the SEARCH buffer
Will overflow. Sending to many bytes into the buffer will cause the server
To reject the request and nothing will happen.


The following transcript demonstrates a sample exploitation of the
Vulnerabilities:
----------------------------- [Transcript] -----------------------------
nc infowarfare.dk 143
* OK IMAP4rev1 MDaemon 6.7.9
0000 CAPABILITY
* CAPABILITY IMAP4rev1 NAMESPACE AUTH=CRAM-MD5 IDLE ACL
0000 OK CAPABILITY completed
0001 LOGIN "RealUser@infowarfare.dk" "HereIsMyPassword"
0001 OK User authenticated.
0002 SELECT "aaa...[2500 Bytes]...aaaa"
----------------------------- [Transcript] -----------------------------

When this attack is preformed the management window will close, if
it is open. The tray icon will remain until the mouse is moved over it,
then it will disappear.
In the event log an error occurs with the following text:
The MDeamon service terminated unexpectedly. It has done this 1 time(s)
The following corrective action will be taken in 0 milliseconds. No Action.

The service has to be started manually, before working properly.


-----[DETECTION
IMAP4rev1 MDaemon 6.7.9 is vulnerable to the above-described attacks.
Earlier versions may be susceptible as well. To determine if a specific
implementation is vulnerable, experiment by following the above transcript.


-----[WORK AROUNDS
Upgrade higher then 6.7.9


-----[VENDOR RESPONSE
Hi Dennis
This problem should have been fixed in 6.8.0.
In the release notes:
o fix to IMAP CREATE buffer overflow vulnerability
Could you please run Nessus (if that's what you are using) against 6.8.0 to
confirm that the problem has been resolved?
Thanks
/George



-----[DISCLOSURE TIMELINE
01/07/2003 Found the Vulnerability, and made an analysis.
01/07/2003 Reported to Vendor
04/07/2003 Recived response from vendor
13/07/2003 Public Disclosure.


-----[ADDITIONAL INFORMATION
The vulnerability was discovered and reported by <der@infowarfare.dk> Dennis
Rand

-----[DISCLAIMER
The information in this bulletin is provided "AS IS" without warranty of any
kind.
In no event shall we be liable for any damages whatsoever including direct,
indirect,
incidental, consequential, loss of business profits or special damages.



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close