exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

HS-A007.txt

HS-A007.txt
Posted Aug 11, 2007
Authored by Stephen Fewer | Site harmonysecurity.com

Harmony Security Advisory - Qbik's WinGate versions below 6.2.2 suffer from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
SHA-256 | 01bc3078c7944cbe079a4848b79ed8258c76fb99bef205db3e3b00b3fe9bca9e

HS-A007.txt

Change Mirror Download
Title
=====
[HS-A007] Qbik WinGate Remote Denial of Service

Date
====
10 August 2007

Affected Software
=================
WinGate versions 5.x and 6.x (prior to 6.2.2).

Overview
========
WinGate by Qbik IP Management Limited is a sophisticated gateway and
server product used in over 600,000 networks across the globe. More
information about WinGate can be found here: www.wingate.com

WinGate provides a number of network services including an SMTP server
for email. It is this SMTP server component that is vulnerable to a
remotely exploitable format string vulnerability that can lead to a
remote DoS attack, resulting in the entire WinGate service being
terminated. The result of the WinGate service being terminated in such a
fashion is that none of the many network services it provides will be
available until a manual restart is performed as well as the loss of any
unsaved data.

Vulnerability Description
=====================
The vulnerability occurs as a result of how the SMTP server component
handles an incorrectly established SMTP session with a client. Upon a
malicious client initiating a connection to the SMTP server the session
can be forced into an invalid state by issuing commands the server was
not expecting. When this occurs an error message is formatted to log the
problem. It is in the formatting of this error message that malicious
attacker supplied data is passed into an unsafe call to vsprintf(),
leading to a format string attack that crashes the process. Arbitrary
code execution cannot be leveraged from this attack.

Solution
========
Qbik have released WinGate version 6.2.2 to address this issue. Further
information is available here: http://www.wingate.com/news.php?id=50

Disclosure Timeline
===================
29 June 2007 - Initial vendor notification
29 June 2007 - Initial vendor response
13 July 2007 - Vendor released fix
10 August 2007 - Public Disclosure

Credit
======
This vulnerability was discovered by Stephen Fewer of Harmony Security.

Web
===
http://www.harmonysecurity.com/HS-A007.html

Disclaimer
==========
The use of this information constitutes acceptance for use in an AS IS
condition. There are no warranties with regard to this information. Any
use of this information is at the user's own risk. In no event shall the
author or publisher be liable for any direct or indirect damages
whatsoever arising out of or in connection with the use or spread of
this information.

Copyright (c) 2007 Harmony Security

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close