[34918] in bugtraq
RE: Remote Buffer Overflow in MailEnable HTTPMail
daemon@ATHENA.MIT.EDU (MailEnable Sales)
Mon May 17 14:36:23 2004
Reply-To: <response@mailenable.com>
From: "MailEnable Sales" <info@mailenable.com>
To: <Oliver@greyhat.de>, <bugtraq@securityfocus.com>
Date: Sun, 16 May 2004 22:29:08 +1000
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
In-Reply-To: <40A60FD5.1010507@greyhat.de>
Message-ID: <369BFC2283814412A18AF5B9B6F05C.MAI@mailenable.com>
Hi,
Thanks for the email. This error was not an overflow issue but a bug in the
service (i.e. the error would cause the service to stop, but could the
exploiter could not exploit this further or run code on the server).
A fix for the bug can be found at:
http://www.mailenable.com/hotfix
Thanks
Peter Fregon
MailEnable Pty. Ltd.
-----Original Message-----
From: Oliver@greyhat.de [mailto:Oliver@greyhat.de]
Sent: Saturday, 15 May 2004 10:41 PM
To: bugtraq@securityfocus.com
Cc: info@mailenable.com
Subject: Remote Buffer Overflow in MailEnable HTTPMail
Regarding to the heap overflow vulnerability of MailEnable HTTPMail
(http://www.securityfocus.com/bid/10312), i installed the latest hotfix
(http://mailenable.com/hotfix/MEHTTPS.zip), and found an additional
overflow.
Sending a request like:
c:\telnet localhost 8080
GET / HTTP/1.0
Authorization: A
Crashes the services. The overflow seems to occur in the Authorization
header variable. A single character will lead to the crash.
I did no further research in order to fully exploit this vuln. A more
detailed readme can be found on my website:
www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt