exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Netragard Security Advisory 2006-08-10

Netragard Security Advisory 2006-08-10
Posted Oct 20, 2006
Authored by Netragard | Site netragard.com

Netragard, L.L.C Advisory: dtmail suffers from a buffer overflow vulnerability which could result in the execution of arbitrary code. More specifically this vulnerability is triggered when using -a flag:

tags | advisory, overflow, arbitrary
SHA-256 | f6f661eece2e97c0022011ba50f31579053126df8dbf50a9b0712d7a70ad6fcc

Netragard Security Advisory 2006-08-10

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

******************** Netragard, L.L.C Advisory* *******************

Strategic Reconnaissance Team
------------------------------------------------
http://www.netragard.com -- "We make I.T. Safe."




[About Netragard]
- ----------------------------------------------------------------------
Netragard is a unique I.T. Security company whose services are fortified
by continual vulnerability research and development. This ongoing
research, which is performed by our Strategic Reconnaissance
Team, specifically focuses on Operating Systems, Software Products and
Web Applications commonly used by businesses internationally. We apply
the knowledge gained by performing this research to our professional
security services. This in turn enables us to produce high quality
deliverables that are the product of talented security professionals and
not those of automated scanners and tools. This advisory is the product
of research done by the Strategic Reconnaissance Team.




[Official URL]
- -------------
http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt




[Advisory Information]
- ----------------------------------------------------------------------
Contact : Adriel T. Desautels
Advisory ID : NETRAGARD-20060810
Product Name : dtmail
Product Version : 5.1b
Vendor Name : Hewlet Packard
Criticality : Local Root Compromise
Effort : Easy
Operating System : Tru64
Type : Unchecked Buffer




[Product Description]
- ----------------------------------------------------------------------
The dtmail program is a desktop mail application. It provides an easy
to use interface for viewing, filing, composing and sending
electronic mail folders and mail messages.

dtmail provides a GUI-based interface for manipulating electronic mail
messages that can have attachments. Use the interface to compose a
message, view a message or a folder containing messages, load new mail
,copy or move messages from one folder to another, delete messages,
reply to messages, add and delete attachments to a message when
composing, and view the contents of attachments in a message. dtmail
also supplies a mail-pervasive desktop environment by providing a
public Tooltalk API that other clients can use to compose and send
messages.

You can use dtmail as a Post Office Protocol (POP) to connect to mail
servers offering POP services. If you choose this option, you can
also select APOP authentication (if supported by your mail server) to
encrypt your user ID and password during communications with your
network mail server.




[Technical Summary]
- ----------------------------------------------------------------------
dtmail suffers from a buffer overflow vulnerability which could result
in the execution of arbitrary code. More specifically this
vulnerability is triggered when using -a flag:

-a file1 ...fileN

Bring up a Compose window with file1 through fileN as
attachments.




[Technical Details]
- ----------------------------------------------------------------------
This was tested against tru64 version 5.1b using a system (a working
display is required). The following gdb output demonstrates the
vulnerability.

gdb) r -a -a `perl -e 'print "A" x 9000'`
Starting program: /cluster/members/member0/tmp/dtmail -a `perl -e
'print "A"x 9000'`
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...
(no debugging symbols found)...(no debugging symbols found)...

Program received signal SIGSEGV, Segmentation fault.
warning: Hit heuristic-fence-post without finding
warning: enclosing function for address 0x4141414141414140
This warning occurs if you are debugging a function without any
symbols (for example, in a stripped executable). In that case, you
may wish to increase the size of the search with the `set heuristic-
fence-post' command.

Otherwise, you told GDB there was a function where there isn't one, or
(more likely) you have encountered a bug in GDB.
0x4141414141414140 in ?? ()




[Proof of Concept]
- ----------------------------------------------------------------------
Undisclosed.




[Vendor Status]
- ----------------------------------------------------------------------
HP was contacted and a patch has been created.




[ For more information please visit http://www.netragard.com ]



[Disclaimer]
- ---------------------http://www.netragard.com-------------------------
Netragard, L.L.C. assumes no liability for the use of the information
provided in this advisory. This advisory was released in an effort to
help the I.T. community protect its self against a potentially
dangerous security risk. This advisory is not an attempt to solicit
business.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (Darwin)

iD8DBQFFNPZOQwbn1P9Iaa0RAtW2AJ9o8aAlUqs4B+fHUgFJ84AUvJ45yACfZoZS
NpbsCYQ+uBqAdf2nLzXMML0=
=RjQf
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close