what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nai.00-05-04.trendmicro

nai.00-05-04.trendmicro
Posted May 17, 2000
Site nai.com

Network Associates, Inc. COVERT Labs Security Advisory - An implementation flaw in the InterScan VirusWall SMTP gateway allows a remote attacker to execute code with the privileges of the daemon.

tags | exploit, remote
SHA-256 | 9b36112a1cd5cd874728fcf15c819f8bfd56941ce60048b6bc3d056dd9fd35f2

nai.00-05-04.trendmicro

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________

Network Associates, Inc.
COVERT Labs Security Advisory
May 4, 2000

Trend Micro InterScan VirusWall Remote Overflow

______________________________________________________________________

o Synopsis

An implementation flaw in the InterScan VirusWall SMTP gateway allows
a remote attacker to execute code with the privileges of the daemon.

RISK FACTOR: HIGH
______________________________________________________________________

o Vulnerable Systems

InterScan VirusWall for Windows NT versions prior to and including
version 3.32 are vulnerable.

______________________________________________________________________

o Vulnerability Information

InterScan VirusWall provides an SMTP gateway which scans all inbound
and outbound mail traffic for viruses before forwarding it to an SMTP
server. The SMTP gateway implements analysis of standard UU encoding
which is used for transmitting binary files over transmission mediums
only supporting simple ASCII data.

A standard UU encoded file contains a final file name to which the
encoded data should be written to. Due to an implementation fault in
VirusWall's handling of this file name it is possible for a remote
attacker to specify an arbitrarily long string overwriting the stack
with user defined data. A filename greater than 128 bytes will allow
a remote attacker to execute arbitrary code.

Creation of a specially crafted filename allows remote shell access
with the privileges of the VirusWall daemon, under Windows NT this is
the SYSTEM account.

______________________________________________________________________

o Resolution

Trend Micro has corrected this problem in InterScan VirusWall for
Windows NT Version 3.4, which is currently available as a beta from:

ftp://ftp.antivirus.com/products/beta/

______________________________________________________________________

o Credits

The discovery and documentation of this vulnerability was conducted
by Barnaby Jack with the COVERT Labs at PGP Security, a Network
Associates business.

______________________________________________________________________

o Contact Information

For more information about the COVERT Labs at PGP Security, visit our
website at http://www.nai.com/covert or send e-mail to covert@nai.com

______________________________________________________________________

o Legal Notice

The information contained within this advisory is Copyright (C) 2000
Networks Associates Technology Inc. It may be redistributed provided
that no fee is charged for distribution and that the advisory is not
modified in any way.

Network Associates and PGP are registered Trademarks of Network
Associates, Inc. and/or its affiliated companies in the United States
and/or other Countries. All other registered and unregistered
trademarks in this document are the sole property of their respective
owners.

______________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1
Comment: Crypto Provided by Network Associates <http://www.nai.com>

iQA/AwUBORHJUqF4LLqP1YESEQJbEgCg2NiiJ//A8PIi+IMaWl0oGhopzPMAnRGu
4JsVNpAnSNx8+3UUZNBo4/C/
=/eMq
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close