From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 11 Dec 2005 11:55:45 +0200
Subject: [NT] Ipswitch Multiple Vulnerabilities (IMail IMAP LIST Command DoS, Collaboration Suite SMTP Format String)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051211111930.5AD465786@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Ipswitch Multiple Vulnerabilities (IMail IMAP LIST Command DoS,
Collaboration Suite SMTP Format String)
------------------------------------------------------------------------
SUMMARY
" <http://www.ipswitch.com/products/collaboration/index.asp> Ipswitch
Collaboration Suite provides e-mail and real-time collaboration, calendar
and contact list sharing, and protection from spam and viruses, all
delivered in an easy to use suite."
Remote exploitation of a denial of service (DoS) vulnerability in Ipswitch
Imail IMAP server allow attackers to crash the target service. Remote
exploitation of a format string vulnerability in Ipswitch IMail allows
remote attackers to execute arbitrary code.
DETAILS
Vulnerable Systems:
* Ipswitch IMail version 8.2
* lpswitch Collaboration Suite 8.20
Immune Systems:
* Ipswitch Collaboration Suite 2.02
IMail IMAP List Command DoS:
The problem specifically exists in handling long arguments to the LIST
command. When a LIST command of approximately 8000 bytes is supplied,
internal string parsing routines can be manipulated in such a way as to
reference non-allocated sections of memory. This parsing error results in
an unhandled access violation, forcing the daemon to exit.
Exploitation allow remote attackers to crash vulnerable IMAP servers and
thereby prevent legitimate usage. The LIST command is only available post
authentication and therefore valid credentials are required to exploit
this vulnerability.
Workaround:
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somewhat.
If possible, consider disabling IMAP and forcing users to use POP3.
Collaboration Suite SMTP Format String:
The vulnerability specifically exists due to improper use of functions
which allow format specifiers in the SMTP service included with ICS.
Remote attackers can supply format string values to certain string
functions to cause memory corruption leading to remote code execution.
The vulnerability may be exploited by supplying specially crafted strings
to any of the following SMTP commands: EXPN, MAIL, MAIL FROM, RCPT TO. All
of the commands are handled by the same function which parses
user-supplied input strings. The following debugger session shows a
backtrace with user-supplied strings as values. With properly constructed
input value, the strings would be interpreted as memory addresses that
would be executed upon returning from the current function.
[..]
00A7F370 006020A0
00A7F374 00A7F634 ASCII 5B,"192.168.242.1] MAIL
FROM:C:\apps\Ipswitch\Collaboration
Suite\IMail\spool\T94e8013e00000005"
00A7F378 00000000
00A7F37C 00000000
00A7F380 7C34FC0B RETURN to MSVCR71.7C34FC0B from MSVCR71.write_char
00A7F384 00602048
00A7F388 00A7F648 ASCII 20,"FROM:C:\apps\Ipswitch\Collaborat"
[..]
Successful exploitation of the format string vulnerability allows
unauthenticated remote attackers to execute arbitrary code. Ipswitch mail
services are commonly configured to allow untrusted access. The use of a
firewall or other mitigating strategy is highly recommended due to the
nature of this vulnerability. The IMail SMTP server is installed by
default.
Vendor Status:
Ipswitch Collaboration Suite 2.02 has been released to address this issue
and is available for download at:
<http://www.ipswitch.com/support/ics/updates/ics202.asp>
http://www.ipswitch.com/support/ics/updates/ics202.asp
IMail Server 8.22 Patch has been released to address this issue and is
available for download at:
<http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp> http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2923>
CAN-2005-2923
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2931>
CAN-2005-2931
Disclosure Timeline:
09/08/2005 Initial vendor notification
09/13/2005 Initial vendor response
10/06/2005 Coordinated public disclosure
ADDITIONAL INFORMATION
The information has been provided by
<mailto:idlabs-advisories@lists.idefense.com.> iDEFENSE.
The original article can be found at:
<http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities> http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities,
<http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities> http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.