exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

centericq_421_bo_06_063.txt

centericq_421_bo_06_063.txt
Posted Jul 11, 2007
Authored by Nico Leidecker | Site portcullis-security.com

Centericq version 4.21 on FreeBSD as well as the official sources have been found vulnerable to multiple buffer overflows.

tags | advisory, overflow
systems | freebsd
SHA-256 | 695f8d41c00f3dd190485927ef216e87f08348cdcb3ef1dd4e144206e4e61c15

centericq_421_bo_06_063.txt

Change Mirror Download
Portcullis Security Advisory 06-063


Vulnerable System:

centericq


Vulnerability Title:

Centericq is vulnerable to multiple buffer overflows.


Vulnerability Discovery And Development:

Portcullis Security Testing Services discovered this vulnerability.
Further research was then carried out..


Credit for Discovery:

Nico Leidecker - Portcullis Computer Security Ltd.


Affected systems:

Version 4.21 on FreeBSD and the official sources were tested as vulnerable.
Previous versions and those versions running on various Linux distributions may be
affected.

Details:

Centericq provides modules to several messaging and chat protocols. The
modules for Yahoo, LiveJournal, Jabber and IRC are vulnerable to multiple
buffer overflows mainly, when the user receives a notification message for
certain events. The following list identifies the events which have to be
undertaken in order to result in a possible buffer overflow.

IRC Hook
- a user in the victims contact list changes his nickname. The sum of the
length of his old and his new nickname has to be greater than 100.
- a user joins or leaves a channel and the length of nickname and real
name are greater than 512.
- the victim obtains the IRC client information from another user. The
information length must be greater than 512 bytes.
- in the event message, when a user gets kicked from a channel and the
length of his username and the name of the op user are greater than 512.
- a third user or the victim gets opped or deopped by an op whereas length
of username and op name are greater than 512.

Untested buffer overflows in the following modules:

Jabber Hook

- the victim obtains the Jabber client information from another user. The
information length must be greater than 512 bytes.

LiveJournal Hook

- in the notification message, when the attacker adds or removes the victim
to or from his friend list.

Yahoo Hook

- in the notification message, when a user invites the victim to a
conference.
- if the attacker declines a conference invitation
- a user joins or leaves a conference
- a user gets informed, when he received a new email.
when the total length of sender and subject are greater than 1024 a
buffer overflow follows.

As an example:
One of the modules is an Internet Relay Chat (IRC) module. The centericq user
is notified for every change of nickname for any user in his contact list and
logs it to a file. However, only 100 bytes are allocated for the log message
which includes both the old and new username. Furthermore, centericq fails to
check the sizes of the usernames and therefore suffers from a buffer overflow
if the sum of the length of old and new username is greater than 40 (format
string covers the remaining 60 bytes). In order to get into the victims contact
list, the attacker simply sends a message to the user. He has not joined any
channel by doing that. In the next step, the attacker changes his nickname to
another name that may include arbitrary code to execute within the context of
the running of centericq. Official IRC Servers may not support usernames that
are 20 bytes or longer. Although, the attacker could lead the victim to a server
controlled by him to exploit these vulnerabilities.


Impact:

The attacker could cause a Denial of Service or execute arbitrary code with
the users privileges.


Exploit:

The proof of concept exploit code is available.


Vendor Status:

Contacted k@thekonst.net

e-mailed - 16th January 2007
e-mailed - 14th February 2007
e-mailed - 15th March 2007

Copyright:

Copyright © Portcullis Computer Security Limited 2005, All rights reserved
worldwide.

Permission is hereby granted for the electronic redistribution of this
information. It is not to be edited or altered in any way without the express
written consent of Portcullis Computer Security Limited.


Disclaimer:

The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are NO
warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user's risk. In no event shall the
author/distributor (Portcullis Computer Security Limited) be held liable for
any damages whatsoever arising out of or in connection with the use or spread
of this information.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    39 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close