exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000012.txt

VIGILANTE-2000012.txt
Posted Sep 18, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #12 - Mdaemon 3.1.1 for Windows NT includes Webconfig and Worldclient which listen to TCP port 3000 and 3001. They both are vulnerable to a heap overflow vulnerability which could be used to execute arbitrary code. Fix available here.

tags | exploit, overflow, arbitrary, tcp
systems | windows
SHA-256 | 9633e5d15d8fbf21e8c07e68f5b9143eb0b13c96a75fdb436fc56cddf57db245

VIGILANTE-2000012.txt

Change Mirror Download
Mdaemon Web Services Heap Overflow DoS

Advisory Code: VIGILANTE-2000012

Release Date:
September 18, 2000

Systems Affected:
- Mdaemon 3.1.1 for Windows NT
It is likely that older versions are also affected.

THE PROBLEM
We want to start off by pointing out that this is not the same problem
as was initially reported by USSR labs in Mdaemon 2.8.5.0:
http://www.ussrback.com/labs15.html.

The Mdaemon Worldclient on TCP port 3000 and the Mdaemon Webconfig on
TCP port 3001 both contain the same vulnerability. If a certain request
is sent to the web service, it results in a heap overflow, crashing the
service with a Dr. Watson access violation.

This appears to be a general problem in the way that Mdaemon handles
these kinds of URLs, so if other Mdaemon web services are used, those
are probably vulnerable as well. The reason that the before mentioned
services were tested is that they are enabled in a default installation.

A Side Note:
Even though this is "only" a Denial of Service, the fact is that it is
a heap overflow, and with several registers overwritten in a process
owned by LocalSystem, there is a possibility that it could be exploited
to gain elevated privileges on the host.

Vendor Status:
The vendor was contacted on the 12th of September and the vulnerability
was verified by them the following day. The fix was officially released
on the 14th of September. It's nice to see the vendor react so quickly.


Fix:
The fix is to upgrade to version 3.1.12, which can be found here:
ftp://ftp.altn.com/MDaemon/Release/md312.exe


Vendor URL: http://www.altn.com
Product URL: http://www.mdaemon.com
Copyright VIGILANTe 2000-09-12

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: isis@vigilante.com
http://www.vigilante.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close