USSR Advisory #36 - Remote / local dos attack in MERCUR WebView WebMail-Client 1.0 for Windows 98/NT. UssrLabs found a buffer overflow in MERCUR WebView WebMail-Client 1.0 (port 1080) where they do not use proper bounds checking in the code who handle the GET commands The following all result in a Denial of Service against the service in question.
6c1b15e1a3945061e371fadaa138e784299cc28aea9b271df508ffefbdcb4f30
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Local / Remote DoS Attack in MERCUR WebView WebMail-Client 1.0 for
Windows 98/NT Vulnerability
USSR Advisory Code: USSR-2000036
Release Date:
March 16, 2000
Systems Affected:
MERCUR WebMail-Client Version 1.0 port (1080)
THE PROBLEM
UssrLabs found a buffer overflow in MERCUR WebView WebMail-Client 1.0
where they
do not use proper bounds checking in the code who handle the GET
commands
The following all result in a Denial of Service against the service
in question.
Example:
http://hostip:1080/mmain.html&mail_user=(buffer)
Where [buffer] is aprox. 1000 characters. (0)
Binary or source for this Exploit:
http://www.ussrback.com/
Exploit:
the Exploit, crash the remote machine service WebMail
Vendor Status:
informed
Vendor Url: http://www.atrium-software.com
Program Url: http://www.atrium-software.com/mercur/webview_e.html
Credit: USSRLABS
SOLUTION
Noting yet.
Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, ADM, HNN, Technotronic and
Wiretrip.
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>
iQA/AwUBOM8LSaVRYEYcg938EQJPzQCeI0v/LxenLCxeR+z8iy/isPt4HcwAn1Dz
IQ1SFSgjQyeLr5tXmLwPQMwo
=LQR7
-----END PGP SIGNATURE-----