[16310] in bugtraq
Becky! Internet Mail Buffer overflow
daemon@ATHENA.MIT.EDU (Nobuo Miwa)
Fri Aug 18 22:30:11 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <200008191044.DDH51596.XBON-J@lac.co.jp>
Date:         Sat, 19 Aug 2000 10:44:35 +0900
Reply-To: Nobuo Miwa <n-miwa@LAC.CO.JP>
From: Nobuo Miwa <n-miwa@LAC.CO.JP>
To: BUGTRAQ@SECURITYFOCUS.COM
Hi,
There were some Buffer overflow vulneravilities in
Beckey! Internet Mail software.
  http://www.rimarts.co.jp/index.html
I contacted author and got fix versions.
How:
The problem is Content-Type: header.
Becky! copies Content-Type: value to Becky-char:
header when I reply or forward it to someone.
But if Content-Type: header's value was over 4500
characters, its buffer is overflowed.
  Content-Type: text/plain; charset=aaaaaaa...
Its malicious header won't be noticed by users.
Version:
Becky! Internet Mail ver 1.26.03
Fixed version:
Becky! Internet Mail ver 1.26.04
  (for "Reply" bug)
Becky! Internet Mail ver 1.26.05
  (for "Forward" bug)
<Nobuo Miwa> n-miwa@lac.co.jp    ( @ @ )  Team SNS (Secure Net Service)
----------------------------o00o--(. .)--o00o--------------------------
http://www.lac.co.jp/security/