[19373] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Fwd: FirstClass Internetgateway "stupidity"]

daemon@ATHENA.MIT.EDU (QA-List)
Mon Feb 26 17:44:15 2001

MIME-Version: 1.0
Content-type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Message-ID:  <fc.000086e9016c87e8000086e9016c87e8.16c89c5@centrinity.com>
Date:         Mon, 26 Feb 2001 12:36:51 -0500
Reply-To: QA-List <qa-list@CENTRINITY.COM>
From: QA-List <qa-list@CENTRINITY.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Matias,

Thank you for bringing this matter to our attention.  At Centrinity, we take
pride in the security of our FirstClass software, and therefore take these
reports very seriously.

It is important to note that this method could not be used to extract sensitive
information outside of an FC system because the reply never goes back out to
the internet.  For example, if an internet user uses this method to spoof the
Administrator and requests a password, the reply would not go back to the
internet user, it would go to the real Admin (if it goes anywhere at all).

Nevertheless, this is a serious bug that could be exploited for malicious
purposes, or at the very least could cause disruption on a FirstClass system.

We have fixed this in the next release of FirstClass Internet Services.


__________________

Jim Gelcer
Senior QA Analyst, Centrinity Inc.
905.415.7122 (Unified Communications - Voice/Fax)
Visit us at www.centrinity.com | jim@centrinity.com



>The email gateway included in FirstClass 5.50 can be tricked into
>sending mail appearing to the users of the firstclass system as coming
>from a local user on the server, including a priviliged user. Doing a
>manual sending to the stmp-server specifying <username_on_system> as the
>origin of the email will do but will be caught by the server
>spamfilters, either discarding them or adding "Spam:" to the topic
>depending on configuration. The requierment for a default configured
>server not to view incoming mails as spam seems to be the presence of a
>@ in the From: header line. Using a bogus address including an @
>outside of the <> in the From: field and adding the shorthand adress
>form <@>, which is expanded by the server to the adress specified with
>MAIL FROM: during earlier smtp transaction will be delivered and marked
>as coming from the specified user. The expanding behaviour is correct
>iirc, not validating the origin (at all) is the problem.
>
>Example:
>-------------------------------------------------------------
>220 mail.skynet.foo FirstClass ESMTP Mail Server v5.50 ready
>MAIL FROM:<Admin>
>250 Admin... Sender ok
>RCPT TO:<user@skynet.foo>
>250 user@skynet.foo... Recipient ok
>DATA
>354 Send your message, end with <CRLF>.<CRLF>
>To: <user@skynet.foo>
>From: evil@socialengineer <@>
>Subject: Gimme you password
>
>Preferably now!
>.
>250 F1FEEACC Message accepted, transient identifier was 20
>-------------------------------------------------------------
>
>The above message will appear to user as a message from the local admin.
>The ways to spot the message is in the firstclass "History" function
>which specifies the mail as "Created by Admin" and "Routed from" an ip
>adress, which normally does not exist. It's also spottable when the
>headers, not shown by default, are viewed and that the info for the
>Admin user is not opened correctly when accessed from that message.
>Works on both Windows and MacOS versions of the server.
>  //Mattias From

home help back first fref pref prev next nref lref last post