From Security.Team@DELPHISCONSULT.CO.UK Mon Jul 10 02:42:13 2000 From: Security Team To: BUGTRAQ@SECURITYFOCUS.COM Date: Thu, 1 Jun 2000 15:43:51 +0100 Subject: DST2K0008: Buffer Overrun in Sambar Server 4.3 [The following text is in the "iso-8859-1" character set] [Your display is set for the "US-ASCII" character set] [Some characters may be displayed incorrectly] > ========================================================================== > ====== > Delphis Consulting Plc > ========================================================================== > ====== > > Security Team Advisories > [30/05/2000] > > > securityteam@delphisplc.com > [http://www.delphisplc.com/thinking/whitepapers/] > > ========================================================================== > ====== > Adv : DST2K0008 > Title : Buffer Overrun in Sambar Server 4.3 > Author : DCIST (securityteam@delphisplc.com) > O/S : Microsoft Windows NT v4.0 Workstation (SP6) > Product : Sambar Server 4.3 > Date : 30/05/2000 > > I. Description > > II. Solution > > III. Disclaimer > > > ========================================================================== > ====== > > > I. Description > ========================================================================== > ====== > > > Delphis Consulting Internet Security Team (DCIST) discovered the following > vulnerability in the Sambar Server under Windows NT. > > By using the default finger script shipped with Sambar server it is > possible > to cause an Buffer overrun in sambar.dll overwriting the EIP allowing the > execution of arbitry code. This is done by sending a large hostname in the > > required field. The string has to be a length of 32286 + EIP (4 bytes) > making > a total of 32290 bytes. > > From the our research it seems the problem also exists in a number of > scripts > which rely on sambar dll functionality this includes but is not limited > to: > > o whois demonstration script > o finger demonstration script > > > II. Solution > ========================================================================== > ====== > > Vendor Status: Informed > > Currently there is no vendor patch available but the following are > preventative > measures Delphis Consulting Internet Security Team would advise users > running > this service to implement. > > o Remove both demonstration scripts. > > > III. Disclaimer > ========================================================================== > ====== > THE INFORMATION CONTAINED IN THIS ADVISORY IS BELIEVED TO BE ACCURATE AT > THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS > OR > IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE > PUBLISHER ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR > CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR > RELIANCE > PLACED ON, THIS INFORMATION FOR ANY PURPOSE. > ========================================================================== > ======