what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iDEFENSE Security Advisory 2006-12-06.1

iDEFENSE Security Advisory 2006-12-06.1
Posted Dec 9, 2005
Authored by iDefense Labs, Nico | Site idefense.com

iDEFENSE Security Advisory 12.06.05 - Remote exploitation of a format string vulnerability in Ipswitch IMail allows remote attackers to execute arbitrary code. The vulnerability specifically exists due to improper use of functions which allow format specifiers in the SMTP service included with ICS. Remote attackers can supply format string values to certain string functions to cause memory corruption leading to remote code execution. iDEFENSE Labs has confirmed the existence of this vulnerability in Ipswitch Collaboration Suite 8.20.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2005-2931
SHA-256 | 752a52103a553eaf68282f1f873af0ee1abcdcfb07621d82ea276ccbf0d65e3b

iDEFENSE Security Advisory 2006-12-06.1

Change Mirror Download

Ipswitch Collaboration Suite SMTP Format String Vulnerability

iDEFENSE Security Advisory 12.06.05
www.idefense.com/application/poi/display?id=346&type=vulnerabilities
December 6, 2005

I. BACKGROUND

Ipswitch Collaboration Suite provides e-mail and real-time
collaboration, calendar and contact list sharing, and protection from
spam and viruses, all delivered in an easy to use suite.

http://www.ipswitch.com/products/collaboration/index.asp

II. DESCRIPTION

Remote exploitation of a format string vulnerability in Ipswitch
IMail allows remote attackers to execute arbitrary code.

The vulnerability specifically exists due to improper use of functions
which allow format specifiers in the SMTP service included with ICS.
Remote attackers can supply format string values to certain string
functions to cause memory corruption leading to remote code execution.
The vulnerability may be exploited by supplying specially crafted
strings to any of the following SMTP commands: EXPN, MAIL, MAIL FROM,
RCPT TO. All of the commands are handled by the same function which
parses user-supplied input strings. The following debugger session
shows a backtrace with user-supplied strings as values. With properly
constructed input value, the strings would be interpreted as memory
addresses that would be executed upon returning from the current
function.

[..]
00A7F370 006020A0
00A7F374 00A7F634 ASCII 5B,"192.168.242.1] MAIL
FROM:C:\apps\Ipswitch\Collaboration
Suite\IMail\spool\T94e8013e00000005"
00A7F378 00000000
00A7F37C 00000000
00A7F380 7C34FC0B RETURN to MSVCR71.7C34FC0B from MSVCR71.write_char
00A7F384 00602048
00A7F388 00A7F648 ASCII 20,"FROM:C:\apps\Ipswitch\Collaborat"
[..]

III. ANALYSIS

Successful exploitation of the format string vulnerability allows
unauthenticated remote attackers to execute arbitrary code. Ipswitch
mail services are commonly configured to allow untrusted access. The
use of a firewall or other mitigating strategy is highly recommended
due to the nature of this vulnerability. The IMail SMTP server is
installed by default.

IV. DETECTION

iDEFENSE Labs has confirmed the existence of this vulnerability in
Ipswitch Collaboration Suite 8.20.

V. WORKAROUND

iDEFENSE is currently unaware of any effective workarounds for this
issue. Access to the affected host should be filtered at the network
boundary if global accessibility is not required. Restricting access to
only trusted hosts and networks may reduce the likelihood of
exploitation.

VI. VENDOR RESPONSE

Ipswitch Collaboration Suite 2.02 has been released to address this
issue and is available for download at:

http://www.ipswitch.com/support/ics/updates/ics202.asp

IMail Server 8.22 has been released to address this issue and is
available for download at:


http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-2931 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

09/08/2005 Initial vendor notification
09/13/2005 Initial vendor response
10/06/2005 Coordinated public disclosure

IX. CREDIT

iDEFENSE credits Nico with the discovery of this vulnerability.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

Free tools, research and upcoming events
http://labs.idefense.com

X. LEGAL NOTICES

Copyright © 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close