[15138] in bugtraq
DST2K0008: Buffer Overrun in Sambar Server 4.3
daemon@ATHENA.MIT.EDU (Security Team)
Thu Jun 1 19:08:24 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-Id: <6C740781F92BD411831F0090273A8AB806FDCF@exchange.servers.delphis.net>
Date: Thu, 1 Jun 2000 15:43:51 +0100
Reply-To: Security Team <Security.Team@DELPHISCONSULT.CO.UK>
From: Security Team <Security.Team@DELPHISCONSULT.CO.UK>
X-To: "win2ksecadvice@LISTSERV.NTSECURITY.NET"
<win2ksecadvice@LISTSERV.NTSECURITY.NET>,
"NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM"
<NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>,
"BUGTRAQ@SECURITYFOCUS.COM" <BUGTRAQ@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
> ==========================================================================
> ======
> Delphis Consulting Plc
> ==========================================================================
> ======
>
> Security Team Advisories
> [30/05/2000]
>
>
> securityteam@delphisplc.com
> [http://www.delphisplc.com/thinking/whitepapers/]
>
> ==========================================================================
> ======
> Adv : DST2K0008
> Title : Buffer Overrun in Sambar Server 4.3
> Author : DCIST (securityteam@delphisplc.com)
> O/S : Microsoft Windows NT v4.0 Workstation (SP6)
> Product : Sambar Server 4.3
> Date : 30/05/2000
>
> I. Description
>
> II. Solution
>
> III. Disclaimer
>
>
> ==========================================================================
> ======
>
>
> I. Description
> ==========================================================================
> ======
>
>
> Delphis Consulting Internet Security Team (DCIST) discovered the following
> vulnerability in the Sambar Server under Windows NT.
>
> By using the default finger script shipped with Sambar server it is
> possible
> to cause an Buffer overrun in sambar.dll overwriting the EIP allowing the
> execution of arbitry code. This is done by sending a large hostname in the
>
> required field. The string has to be a length of 32286 + EIP (4 bytes)
> making
> a total of 32290 bytes.
>
> From the our research it seems the problem also exists in a number of
> scripts
> which rely on sambar dll functionality this includes but is not limited
> to:
>
> o whois demonstration script
> o finger demonstration script
>
>
> II. Solution
> ==========================================================================
> ======
>
> Vendor Status: Informed
>
> Currently there is no vendor patch available but the following are
> preventative
> measures Delphis Consulting Internet Security Team would advise users
> running
> this service to implement.
>
> o Remove both demonstration scripts.
>
>
> III. Disclaimer
> ==========================================================================
> ======
> THE INFORMATION CONTAINED IN THIS ADVISORY IS BELIEVED TO BE ACCURATE AT
> THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS
> OR
> IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE
> PUBLISHER ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
> CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR
> RELIANCE
> PLACED ON, THIS INFORMATION FOR ANY PURPOSE.
> ==========================================================================
> ======