[ISN] EEYE: ZoneLabs SMTP Processing Buffer Overflow

From: InfoSec News (isn@private)
Date: Mon Feb 23 2004 - 09:12:08 PST

  • Next message: InfoSec News: "[ISN] Police on the lookout for cyber crimes"

    Forwarded from: "Marc Maiffret" <mmaiffret@private>
    
    ZoneLabs SMTP Processing Buffer Overflow
    
    Release Date:
    February 18, 2004
    
    Date Reported:
    February 13, 2004
    
    Severity:
    Medium (Local Privilege Escalation/Remote Code Execution)
    
    Vendor:
    ZoneLabs Inc.
     
    Software Affected:
    ZoneAlarm 4.0 and above
    ZoneAlarm Pro 4.0 and above
    ZoneAlarm Plus 4.0 and above
    ZoneLabs Integrity client 4.0 and above
    
    Description:
     
    ZoneLabs provides a suite of desktop firewall products. Products in this
    suite such as ZoneAlarm analyze incoming and outgoing email messages for
    malicious or otherwise abnormal content. When ZoneAlarm examines
    outgoing email messages a buffer overflow condition is presented when
    they retrieve the destination email address from the message. An
    attacker can exploit this vulnerability to elevate his privileges to
    SYSTEM on any machine protected by a vulnerable ZoneLabs product. This
    vulnerability can also be exploited remotely if an attacker can
    manipulate the protected system into sending an outgoing email message.
    
    Technical Description:
     
    A stack based buffer overflow vulnerability within vsmon.exe can be
    exploited to execute code with the context of the SYSTEM account. The
    vulnerability exists within the component responsible for processing the
    RCPT TO command argument. By specifying a large argument to the RCPT TO
    command an internal stack based buffer can be overflowed within the
    TrueVector Internet Monitor (vsmon.exe) process.
    
    Protection:
    Retina Network Security Scanner has been updated to identify this
    vulnerability.
    
    Vendor Status:
    ZoneLabs was contacted and within only a few days they produced an
    update to eliminate this vulnerability within their products. We would
    like to give special recognition to the responsiveness of ZoneLabs in
    creating a fix to protect their customers. 
    
    http://download.zonelabs.com/bin/free/securityAlert/8.html
    
    Credit:
    Discovery: Riley Hassell
    
    Related Links:
    Retina Network Security Scanner - Free 15 Day Trial
    http://www.eeye.com/html/Products/Retina/index.html
    
    Greetings:
    All the other firewall vendors on our list.
    
    Copyright (c) 1998-2004 eEye Digital Security Permission is hereby
    granted for the redistribution of this alert electronically. It is not
    to be edited in any way without express consent of eEye. If you wish to
    reprint the whole or any part of this alert in any other medium
    excluding electronic medium, please e-mail alert@private for
    permission.
    
    Disclaimer
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition. There
    are NO warranties with regard to this information. In no event shall the
    author be liable for any damages whatsoever arising out of or in
    connection with the use or spread of this information. Any use of this
    information is at the user's own risk.
    
    Feedback
    Please send suggestions, updates, and comments to:
    
    eEye Digital Security
    http://www.eEye.com
    info@private
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomo@private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Mon Feb 23 2004 - 17:37:24 PST