[15138] in bugtraq

home help back first fref pref prev next nref lref last post

DST2K0008: Buffer Overrun in Sambar Server 4.3

daemon@ATHENA.MIT.EDU (Security Team)
Thu Jun 1 19:08:24 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-Id:  <6C740781F92BD411831F0090273A8AB806FDCF@exchange.servers.delphis.net>
Date:         Thu, 1 Jun 2000 15:43:51 +0100
Reply-To: Security Team <Security.Team@DELPHISCONSULT.CO.UK>
From: Security Team <Security.Team@DELPHISCONSULT.CO.UK>
X-To:         "win2ksecadvice@LISTSERV.NTSECURITY.NET"
              <win2ksecadvice@LISTSERV.NTSECURITY.NET>,
              "NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM"
              <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>,
              "BUGTRAQ@SECURITYFOCUS.COM" <BUGTRAQ@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

> ==========================================================================
> ======
> 			         Delphis Consulting Plc
> ==========================================================================
> ======
>
>        			       Security Team Advisories
> 			               [30/05/2000]
> 					
>
> 		    	     securityteam@delphisplc.com
> 		  [http://www.delphisplc.com/thinking/whitepapers/]
> 	
> ==========================================================================
> ======
> Adv	: 	DST2K0008
> Title	:	Buffer Overrun in Sambar Server 4.3
> Author	:	DCIST (securityteam@delphisplc.com)
> O/S	:	Microsoft Windows NT v4.0 Workstation (SP6)
> Product	:	Sambar Server 4.3
> Date	:	30/05/2000
>
> I.    Description
>
> II.   Solution
>
> III.  Disclaimer
>
>
> ==========================================================================
> ======
>
>
> I. Description
> ==========================================================================
> ======
>
>
> Delphis Consulting Internet Security Team (DCIST) discovered the following
> vulnerability in the Sambar Server under Windows NT.
>
> By using the default finger script shipped with Sambar server it is
> possible
> to cause an Buffer overrun in sambar.dll overwriting the EIP allowing the
> execution of arbitry code. This is done by sending a large hostname in the
>
> required field. The string has to be a length of 32286 + EIP (4 bytes)
> making
> a total of 32290 bytes.
>
> From the our research it seems the problem also exists in a number of
> scripts
> which rely on sambar dll functionality this includes but is not limited
> to:
>
> o whois demonstration script
> o finger demonstration script
>
>
> II. Solution
> ==========================================================================
> ======
>
> Vendor Status: Informed
>
> Currently there is no vendor patch available but the following are
> preventative
> measures Delphis Consulting Internet Security Team would advise users
> running
> this service to implement.
>
> o Remove both demonstration scripts.
>
>
> III. Disclaimer
> ==========================================================================
> ======
> THE INFORMATION CONTAINED IN THIS ADVISORY IS BELIEVED TO BE ACCURATE AT
> THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS
> OR
> IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS.  NEITHER THE AUTHOR NOR THE
> PUBLISHER ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
> CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR
> RELIANCE
> PLACED ON, THIS INFORMATION FOR ANY PURPOSE.
> ==========================================================================
> ======

home help back first fref pref prev next nref lref last post