[20609] in bugtraq
Becky! 2.00.05 Buffer Overflow
daemon@ATHENA.MIT.EDU (Ichinose Sayo)
Tue May 15 03:24:40 2001
Date: Mon, 14 May 2001 17:01:31 +0900
From: Ichinose Sayo <ichinose@lac.co.jp>
To: BUGTRAQ <BUGTRAQ@securityfocus.com>
Message-Id: <20010514164704.ECC2.ICHINOSE@lac.co.jp>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
Hi,
I found Buffer Overflow vulnerabilities in Becky! Internet Mail 2.00.05
Becky! Internet Mail is popular MUA (Mail User Agent) designed for
Windows operating systems.
Problem Description
-------------------
If the message includes over 65536 bytes without new line characters,
the buffer will be overflowed.
Buffer overflow also occurs when attempt to reply or forward to the
message included over 8188 bytes without new line characters.
Successful exploitation of this vulnerability could allow remote
attackers to execute arbitrary commands.
Tested Version:
----------------
Becky! Internet Mail ver 2.00.05
Becky! Internet Mail ver 2.00.03
Status of fixes:
-----------------
Due to prompt response by the author, the version 2.00.06, which was
fixed this problem, was published.
http://www.rimarts.co.jp/becky.htm
Web site that shows reproducing this vulnerability is available from:
http://www.lac.co.jp/security/english/test/becky2.html
Becky! Internet Mail Official Site:
------------------------------------
http://www.rimarts.co.jp/index.html
----
Sayo Ichinose<ichinose@lac.co.jp>
Computer Security Laboratory
LAC Co.,Ltd.
http://www.lac.co.jp/security/