[19662] in bugtraq
def-2001-11: MDaemon 3.5.4 Dos-Device DoS
daemon@ATHENA.MIT.EDU (=?iso-8859-1?Q?Peter_Gr=FCndl?=)
Thu Mar 15 12:59:48 2001
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
Message-ID: <077d01c0ad53$70e1c930$71002d0a@dk.defcomsec.com>
Date: Thu, 15 Mar 2001 14:25:45 +0100
Reply-To: =?iso-8859-1?Q?Peter_Gr=FCndl?= <peter.grundl@DEFCOM.COM>
From: =?iso-8859-1?Q?Peter_Gr=FCndl?= <peter.grundl@DEFCOM.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
======================================================================
Defcom Labs Advisory def-2001-11
MDaemon 3.5.4 Dos-Device DoS
Author: Peter Gründl <peter.grundl@defcom.com>
Release Date: 2001-03-15
======================================================================
------------------------=[Brief Description]=-------------------------
Webservices in the Mdaemon package can be crashed by requesting a
malicious URL.
------------------------=[Affected Systems]=--------------------------
- MDaemon 3.5.4 Standard for Windows NT/2000
- MDaemon 3.5.4 Pro for Windows NT/2000
----------------------=[Detailed Description]=------------------------
There is a problem with the way the Worldclient (default port 3000)
and the Webconfig service (default port 3001) handle requests for dos-
devices.
If a user requests eg. "http://www.foo.org:3000/aux", the Worldclient
service will crash. The same fault affects the Webconfig service.
The service needs to be restarted from the Mdaemon console.
---------------------------=[Workaround]=-----------------------------
Upgrade to MDaemon 3.5.6:
http://mdaemon.deerfield.com/download/getmdaemon.cfm
-------------------------=[Vendor Response]=--------------------------
This issue was brought to the vendor's attention on the 3rd of March,
2001 and the vendor released a patch on the 9th of March, 2001.
======================================================================
This release was brought to you by Defcom Labs
labs@defcom.com www.defcom.com
======================================================================