what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nmrc.98-09-23.novell.groupwise

nmrc.98-09-23.novell.groupwise
Posted Sep 23, 1999

nmrc.98-09-23.novell.groupwise

SHA-256 | 30195507c6a486033886248fbefad5d6cd862d5db32179995b17a5424d3c0085

nmrc.98-09-23.novell.groupwise

Change Mirror Download

From thegnome@NMRC.ORG Sat Sep 26 04:07:03 1998
From: Simple Nomad <thegnome@NMRC.ORG>
To: BUGTRAQ@netspace.org
Date: Sun, 22 Mar 1998 01:32:12 -0600
Subject: NMRC Advisory - GroupWise Buffer Overflow

_______________________________________________________________________________

Nomad Mobile Research Centre
A D V I S O R Y
www.nmrc.org
Jitsu-Disk [jitsu@nmrc.org]
23Sep1998
_______________________________________________________________________________

Platform : Novell IntranetWare
Application : GroupWise
Severity : High


Synopsis
--------

A remote buffer overflow condition exists in Novell Groupwise Internet
Gateway that permits DoS attacks and possible execution of malicious code.
The overflow happens in the string parsing of the USER command in the POP3
daemon, and in the command parsing of the LDAP daemon.

Tested configuration
--------------------

The bug was tested with the following configuration :

Novell Intranetware
Intranetware Service Pack 5
TCP/IP TCPN05 patch
Novell BorderManager 2.1.0
BorderManager Service pack 2.0D
GroupWise 5.2
GroupWise Service pack 3

Bug(s) report
-------------

- POP3

When connecting to the pop3 daemon and issuing the USER command with a
user name of 512 bytes or longer you get disconnected. Normal.

Now if you give a user name longer than 241 bytes the execution stack
gets smashed. On our system it got filled with the Hex value of the ASCII
name provided starting at byte 242.

Ex :
-> Telnet buggy.groupwise
<- Groupwise blabla blabla ....
-> USER xxxxxxxxxxxxxxxx ..... xxxxxxxxxXXXXXXXXXXXXXXXXXXXXXXX
byte: 241||242
||
smash <-- --> exec stack filled
by what follows

When SP5 is installed, the NLM will abend but not the server.

Little bonus : when issuing the USER command with a possible user
name "ex: user001" that dosen't exists you get the following : "-ERR user
not found", and are still connected. This allows a malicious attacker to
check for valid accounts.

-LDAP

Same stuff, with a better feature : the size of the command string is
virtually unlimited.

Solution/Workaround
-------------------

POP3 & LDAP service are active by default, disable them until Novell posts
a patch. After disabling them it is recommended the server is recycled to
ensure they are really off.

Comments
--------

During testing it was noted that there were some inconsistencies between
GroupWise databases, although the source of the inconsistency was not
conclusively determined to be the overflow. Alternative : uninstall
GroupWise and get Lotus Notes.

Additionally, it should be noted that there is currently no known exploit
that allows remote execution of code on a NetWare server, but overflow
conditions like this certainly would help open that door.

Novell has been contacted regarding this bug.

_______________________________________________________________________________
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close