[12446] in bugtraq

home help back first fref pref prev next nref lref last post

Palm Hotsync vulnerable to DoS attack

daemon@ATHENA.MIT.EDU (Aviram Jenik)
Thu Nov 4 17:45:23 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <0e4001bf270a$2509d1e0$0201a8c0@jenik.com>
Date:         Thu, 4 Nov 1999 23:18:30 +0200
Reply-To: Aviram Jenik <aviram@SECURITEAM.COM>
From: Aviram Jenik <aviram@SECURITEAM.COM>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Hi.

In the spirit of w00giving, we did a little research on attacks that can be
performed on the Palm Pilot (we're also searching for tools that can turn
the Palm into an attacking tool, but that's another thing).
A hotsync DoS attack is not as sexy as breaking to networks via printers,
but it still deserves some attention ;-)

The Palm Hotsync manager is vulnerable to a buffer overflow attack that can
crash the hotsync application and possibly be used to execute arbitrary code
on the machine running the hotsync.

Vulnerable systems:
HotSync Manager 3.0.4 under Windows 98

Non Vulnerable systems:
HotSync Manager under Windows 2000

Details
--------
When the Hotsync manager is set to 'network' mode, it listens on port 14238.
By sending a large amount of data to that port followed by a newline, it's
possible to crash the HotSync application.
3Com has been notified of this, and promised that the next release of the
Hotsync manager will be fixed.

Our full advisory can be found at:
http://www.securiteam.com/exploits/
Palm_HotSync_Manager_is_vulnerable_to_Denial_of_Service_attack.html

(NOTE: URL wrapped)

-------------------------
Aviram Jenik
SecuriTeam
http://www.SecuriTeam.com

home help back first fref pref prev next nref lref last post