Eremove Gui.CPP程序远程缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193870 漏洞类型 缓冲区溢出
发布时间 2006-08-09 更新时间 2006-08-16
CVE编号 CVE-2006-4057 CNNVD-ID CNNVD-200608-162
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2006080077
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-162
|漏洞详情
MitchMurrayEremove1.4中的gui.cpp程序存在缓冲区溢出漏洞,远程攻击者可借助一个超大的邮件附件触发拒绝服务攻击(应用程序崩溃),并可能执行任意代码。
|漏洞EXP
_   _____/_   ___  /   |   \_____   |    __)_ /      //    ~    /   |    |        \     ___    Y    /    |    /_______  / ______  /___|_  /_______  /

/         /       /         /

.OR.ID

ECHO_ADV_42$2006

------------------------------------------------------------------------
---

[ECHO_ADV_42$2006] BufferOverflow in Eremove Client

------------------------------------------------------------------------
---

Author       : Dedi Dwianto

Date         : Aug, 01st 2006

Location     : Indonesia, Jakarta

Web          : http://advisories.echo.or.id/adv/adv42-theday-2006.txt

Exploitation : Local

Critical Lvl : High

------------------------------------------------------------------------
---

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Eremove

version     : 1.4

URL         : http://eremove.sourceforge.net/

Description :

Eremove is a simple application for linux, based on GTK, for logging into

a POP3 mail account, quickly seeing a summary of everything that is there

waiting for you, and previewing/deleteing some or all of those emails painlessly.

------------------------------------------------------------------------
---

Vulnerability:

~~~~~~~~~~~~~~~~

The function priview_create  used by Eremove  is affected by a buffer-overflow

vulnerability which happens when it tries to store the exceeding data

available in the input email in the message_body  buffer of only 65534 bytes.

------------------gui.cpp-----------------------------

.....

gint preview_create (int message_num) {

...

GtkWidget       *hbox;

GtkWidget       *vscrollbar;

char            *tmp_pntr;

char            tmp_str[255];

char            buf[65534];

char            message_body[65534];

gint            i;

...

}

if (!find_header_field("Date", buf, &date)) {

date = (char *) malloc(strlen("unspecified")*sizeof(char));

strcpy(date, "unspecified");

}

strcpy(message_body, buf);

...

----------------------------------------------------------

POC:

~~~~

Send EMail with Attachment more than 100 KB

and Openwith eremove.

Eremove will be crash.

------------------------------------------------------------------------
---

Shoutz:

~~~~~~~

~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous

~ My Lovely Jessy

~ newbie_hacker (at) yahoogroups (dot) com [email concealed]

~ #aikmel #e-c-h-o @irc.dal.net

~ SUPPORT PALESTINE & LEBANON

------------------------------------------------------------------------
---

Contact:

~~~~~~~~

Dedi Dwianto || echo|staff || the_day[at]echo[dot]or[dot]id

Homepage: http://theday.echo.or.id/

-------------------------------- [ EOF ] ----------------------------------
|参考资料

来源:BID
名称:19352
链接:http://www.securityfocus.com/bid/19352
来源:BUGTRAQ
名称:20060804[ECHO_ADV_42$2006]BufferOverflowinEremoveClient
链接:http://www.securityfocus.com/archive/1/archive/1/442220/100/0/threaded
来源:SECTRACK
名称:1016640
链接:http://securitytracker.com/id?1016640
来源:MISC
链接:http://advisories.echo.or.id/adv/adv42-theday-2006.txt
来源:SREASON
名称:1368
链接:http://securityreason.com/securityalert/1368