CVE-2005-0022
CVSS4.6
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:07:28
NMCOPS    

[原文]Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.


[CNNVD]Exim auth_spa_server()缓冲区溢出漏洞(CNNVD-200505-664)

        Exim是一款流行的EMAIL服务器(MTA)。
        Exim auth_spa_server function函数中存在一个边界检查不充分问题,远程攻击者可以利用这个漏洞对程序进行缓冲区溢出攻击,可能以进程权限执行任意指令。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:university_of_cambridge:exim:4.41
cpe:/a:university_of_cambridge:exim:4.40
cpe:/a:university_of_cambridge:exim:4.42

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11293Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and pos...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0022
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0022
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-664
(官方数据源) CNNVD

- 其它链接及资源

http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
(UNKNOWN)  CONFIRM  http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
http://marc.info/?l=bugtraq&m=110824870908614&w=2
(UNKNOWN)  BUGTRAQ  20050212 exim auth_spa_server() PoC exploit
http://security.gentoo.org/glsa/glsa-200501-23.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200501-23
http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
(PATCH)  MLIST  [exim] 20050104 2 smallish security issues
http://www.idefense.com/application/poi/display?id=178&type=vulnerabilities
(UNKNOWN)  IDEFENSE  20050107 Exim auth_spa_server() Buffer Overflow Vulnerability
http://www.redhat.com/support/errata/RHSA-2005-025.html
(PATCH)  REDHAT  RHSA-2005:025
http://www.securityfocus.com/bid/12188
(UNKNOWN)  BID  12188

- 漏洞信息

Exim auth_spa_server()缓冲区溢出漏洞
中危 缓冲区溢出
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        Exim是一款流行的EMAIL服务器(MTA)。
        Exim auth_spa_server function函数中存在一个边界检查不充分问题,远程攻击者可以利用这个漏洞对程序进行缓冲区溢出攻击,可能以进程权限执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html

- 漏洞信息 (F35648)

IDEF0731.txt (PacketStormID:F35648)
2005-01-11 00:00:00
 
advisory,remote,overflow,arbitrary
unix
CVE-2005-0022
[点击下载]

iDEFENSE Security Advisory IDEF0731 - Remote exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges. Exim is a message transfer agent developed for use on Unix systems. The problem specifically exists in the auth_spa_server function. The function fails to check the length of input to spa_base64_to_bits(), which decodes a Base64-encoded string into a buffer of a fixed length. This string is user-controlled and passed to the program from a remote connection.

Exim auth_spa_server() Buffer Overflow Vulnerability 

iDEFENSE Security Advisory [IDEF0731]
www.idefense.com/application/poi/display?id=178&type=vulnerabilities
January 07, 2004

I. BACKGROUND

Exim is a message transfer agent developed for use on Unix systems. More

information is available at: 

	http://www.exim.org/

II. DESCRIPTION

Remote exploitation of a buffer overflow vulnerability in Exim 4.41 may
allow execution of arbitrary commands with elevated privileges.

Exim is a message transfer agent developed for use on Unix systems. The 
problem specifically exists in the auth_spa_server function. The 
function fails to check the length of input to spa_base64_to_bits(), 
which decodes a Base64-encoded string into a buffer of a fixed length. 
This string is user-controlled and passed to the program from a remote 
connection.

III. ANALYSIS

Exploitation of this vulnerability will give an attacker remote access 
to the mailer uid. The exim mailer is setuid root, but drops privileges 
before the vulnerable code is reached. A remote attacker may be able to 
use other vulnerabilities to further elevate their privileges.

This vulnerability is only exploitable when the spa authentication 
method has been configured by setting AUTH_SPA=yes in Local/Makefile 
when building it.

IV. DETECTION

Exim versions 4.40 and 4.41 have been confirmed vulnerable. The source 
code for version 4.42 suggests that it is vulnerable. It is suspected 
that previous versions are also vulnerable.

To determine if the Exim version being used is vulnerable, connect to
port 25 of the machine with Exim installed and type:

   EHLO localhost

If AUTH NTLM appears in the output the application may be vulnerable.

V. WORKAROUND

iDEFENSE is currently unaware of any effective workarounds for this 
vulnerability.

VI. VENDOR RESPONSE

A patch for Exim release 4.43 which addresses this vulnerability is
available at:

   http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html

The patch will be incorporated into a future Exim release (4.50).

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2005-0022 to these issues. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

12/23/2004  Initial vendor notification
12/29/2004  Initial vendor response
01/07/2004  Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
    

- 漏洞信息

12727
Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

A remote overflow exists in Exim. Exim fails to have sufficient boundary checks in the 'spa_base64_to_bits()' function resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code in the context of the affected application resulting in a loss of integrity.

- 时间线

2005-01-06 Unknow
2005-02-12 2005-01-12

- 解决方案

Upgrade to version 4.44 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Exim SPA Authentication Remote Buffer Overflow Vulnerability
Boundary Condition Error 12188
Yes No
2005-01-06 12:00:00 2009-07-12 09:27:00
Discovery is credited to an anonymous source.

- 受影响的程序版本

University of Cambridge Exim 4.43
University of Cambridge Exim 4.42
University of Cambridge Exim 4.41
University of Cambridge Exim 4.40
University of Cambridge Exim 4.34
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
University of Cambridge Exim 4.33
University of Cambridge Exim 4.32
University of Cambridge Exim 4.21
University of Cambridge Exim 4.20
University of Cambridge Exim 4.10
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
Red Hat Fedora Core3
Red Hat Fedora Core2
ALT Linux ALT Linux Junior 2.3
ALT Linux ALT Linux Compact 2.3

- 漏洞讨论

Exim is reported susceptible to a buffer overflow vulnerability when attempting to authenticate remote users via SPA. This issue is due to a failure of the application to properly bounds check user-supplied input prior to copying it to a fixed-size memory buffer.

This vulnerability reportedly allows remote attackers to execute arbitrary code in the context of the affected server application. This issue is only exploitable if SPA authentication is configured to be used. SPA authentication is not enabled by default.

- 漏洞利用

Exploit code is available.

- 解决方案

The vendor has released patches, and a snapshot version of Exim to address this issue. These patches are for version 4.43 of Exim, but the vendor has reported that they may also work for previous versions.

The patches can be extracted from the referenced email message from Philip Hazel.

SuSE Linux has released a security summary report (SUSE-SR:2005:002) that contains fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

RedHat has released two advisories called FEDORA-2005-001 to address this, and other issues for Fedora Core 2 and 3. Please see the referenced advisories for further information.

Ubuntu has released advisory USN-56-1 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.

Gentoo has released an advisory GLSA 200501-23 to address issues in Exim. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=mail-mta/exim-4.43-r2"

ALT Linux has released updates dealing with this and other issues. Please see the reference section for more information.


University of Cambridge Exim 4.10

University of Cambridge Exim 4.20

University of Cambridge Exim 4.21

University of Cambridge Exim 4.32

University of Cambridge Exim 4.33

University of Cambridge Exim 4.34

University of Cambridge Exim 4.40

University of Cambridge Exim 4.41

University of Cambridge Exim 4.42

University of Cambridge Exim 4.43

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站