exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Courier Heap Overflow / Out Of Bounds Read Access

Courier Heap Overflow / Out Of Bounds Read Access
Posted Jun 30, 2015
Authored by Hanno Boeck | Site hboeck.de

Courier mail server versions before 0.75 suffer from out of bounds read access and heap overflow vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 425cff4ddf61bbeaf9670a04c641dac78fd64b617955be6dc1d7dbc7d51f3a76

Courier Heap Overflow / Out Of Bounds Read Access

Change Mirror Download
https://blog.fuzzing-project.org/17-Courier-mail-server-Write-heap-overflow-in-mailbot-tool-and-out-of-bounds-heap-read-in-imap-folder-parser.html

Two memory access issues were found in the Courier mail server. These
issues were discovered by compiling the software with Address Sanitizer
(-fsanitize=address) and running the test suite.

In the file mailboxlist.c, part of the IMAP folder parser, there is a
memcmp call checking whether the fist six bytes of a string match
"SHARED". However the string can be less than six bytes, which will
cause an out of bounds read access. This issue is unlikely to cause
much trouble.

In the mailbot tool (mailbot.c) there is a memory allocation for a
zero-terminated list of pointers. The allocation only reserves one byte
for the zero termination, however it must be the size of the pointer (8
bytes on 64 bit systems). Therefore it causes a write heap overflow of
seven zero bytes. The code parses command line data, therefore it is
unlikely that any attacker controlled input is affected.

Both issues have been reported to Courier's developer Sam Varshavchik
on 27th June 2015 and were fixed with the release of courier 0.75 on
29th June 2015.

Commit / Patch (bundles some unrelated changes, the relevant parts are
in mailbot.c and mailboxlist.c)
https://github.com/svarshavchik/courier-libs/commit/174541a2e670c0ee70fd2fb3116209f96ecc173e

Courier 0.75 release announcement
http://sourceforge.net/p/courier/mailman/message/34249147/

--
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@hboeck.de
GPG: BBB51E42
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close