CVE-1999-1515
CVSS5.0
发布时间 :1999-08-31 00:00:00
修订时间 :2008-09-05 16:19:42
NMCOES    

[原文]A non-default configuration in TenFour TFS Gateway 4.0 allows an attacker to cause a denial of service via messages with incorrect sender and recipient addresses, which causes the gateway to continuously try to return the message every 10 seconds.


[CNNVD]TFS Gateway 4.0拒绝服务漏洞(CNNVD-199908-060)

        TenFour TFS Gateway 4.0版本中的非默认配置存在漏洞。攻击者借助带有不正确发送人和接受地址的信息导致服务拒绝。该漏洞导致网关每隔10秒不断尝试返回信息。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1515
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1515
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199908-060
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/3290.php
(VENDOR_ADVISORY)  XF  tfs-gateway-dos(3290)
http://www.securityfocus.com/bid/613
(VENDOR_ADVISORY)  BID  613

- 漏洞信息

TFS Gateway 4.0拒绝服务漏洞
中危 其他
1999-08-31 00:00:00 2006-09-05 00:00:00
远程  
        TenFour TFS Gateway 4.0版本中的非默认配置存在漏洞。攻击者借助带有不正确发送人和接受地址的信息导致服务拒绝。该漏洞导致网关每隔10秒不断尝试返回信息。

- 公告与补丁

        This can be solved by changing the way that TFS handles failed messages. By turning off the "returning the original message" to the sender of a message, this vulnerability is avoided.
        TenFour has made a fixed version of TFS Gateway available to its customers from its website at:
        http://www.tenfour.se
        The non-vulnerable version is build 219 and later, and does not allow the full message to be returned to the sender in the event of failure.

- 漏洞信息 (19477)

TFS Gateway 4.0 Denial of Service Vulnerability (EDBID:19477)
hardware dos
1999-08-31 Verified
0 Anonymous
N/A [点击下载]
source: http://www.securityfocus.com/bid/613/info

TFS Gateway 4.0, when configured in a specific non-default manner, is vulnerable to a remotely exploitable denial of service attack. If 'return entire message to sender' is enabled for failed send attempts, and an email is sent to the TFS Gateway with 1: the From: address set to an invalid address on a remote machine and 2: an invalid To: address on the target machine, the gateway will attempt to return the complete message once every 10 seconds until an administrator manually stops it. If enough emails of sufficient size of this nature are sent it can lead to a degradation or denial of service.

telnet to Gateway smtp server and enter the following commands:

HELO
MAIL FROM: invalid@remote.com
RCPT TO: invalid@target.com
DATA

.
QUIT 		

- 漏洞信息

13551
TenFour TFS Gateway Malformed Message DoS
Remote / Network Access Denial of Service
Loss of Availability Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-08-02 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, TFS Technology has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

TFS Gateway 4.0 Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 613
Yes No
1999-08-31 12:00:00 2009-07-11 12:56:00
The credit for this vulnerability being exposed goes to "FableMan / Noxidus / #HACK on IRC-Net". The information was emailed to Security Focus on August 30, 1999.

- 受影响的程序版本

TFS Gateway 4.0
TFS Gateway 4.0 Build 219

- 不受影响的程序版本

TFS Gateway 4.0 Build 219

- 漏洞讨论

TFS Gateway 4.0, when configured in a specific non-default manner, is vulnerable to a remotely exploitable denial of service attack. If 'return entire message to sender' is enabled for failed send attempts, and an email is sent to the TFS Gateway with 1: the From: address set to an invalid address on a remote machine and 2: an invalid To: address on the target machine, the gateway will attempt to return the complete message once every 10 seconds until an administrator manually stops it. If enough emails of sufficient size of this nature are sent it can lead to a degradation or denial of service.

- 漏洞利用

telnet to Gateway smtp server and enter the following commands:

HELO
MAIL FROM: invalid@remote.com
RCPT TO: invalid@target.com
DATA

.
QUIT

- 解决方案

This can be solved by changing the way that TFS handles failed messages. By turning off the "returning the original message" to the sender of a message, this vulnerability is avoided.

TenFour has made a fixed version of TFS Gateway available to its customers from its website at:
http://www.tenfour.se
The non-vulnerable version is build 219 and later, and does not allow the full message to be returned to the sender in the event of failure.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站