Some holes for Win/UNIX softwares

From: UNYUN (shadowpenguinat_private)
Date: Tue Nov 02 1999 - 05:39:56 PST

  • Next message: dark spyrit: "Exploit + temp patch for aVirt mail server 3.5."

    Hello,
    
    We found security problems on some softwares for UNIX and Windows9*/NT.
    This is a detailed report about such security problems.
    The following problems are from the posts of BUGTRAQ-JP (they are
    written in Japanese), but there are some requests, so I post to BUGTRAQ.
    
      vender      software          version   exploitabled
    -----------------------------------------------------------
    1 YAMAHA      YAMAHA MidiPlug   1.10b     IE4/5 Windows98J
    2 BTD STUDIO  ZOM-MAIL          1.09      Windows98J
    3             AN-HTTPd          1.20b     Windows98J
    4 IBM         HomePagePrint     1.0.7     Windows98J
    5             uum               4.2       Turbo Linux3J
    6             canuum            3.5b2     Turbo Linux3J
    
    
    (1) YAMAHA MidiPlug 1.10b
    
    Problem:
    Midi-Plugin program "YAMAHA MidiPlug 1.10b-j" for Windows IE4/5
    contains the buffer overflow bug. If the long "TEXT" variable is
    specified in EMBED tag, the buffer overflow occurs. If attacker sets the
    exploit on the webpage, visitor's host will be cracked by the any
    instructions written in the "TEXT" variable.
    
    Solution:
    If the check of "execution of active X controle and plugin" is turned to
    "invalid", you can avoid this problem. "Display dialog box mode" is also
    vulnerable. The overflow occurs without the dialog box warning, if the
    opening file is stored in local disk and it is opened.
    
    Exploit:
    http://shadowpenguin.backsection.net/toolbox.html#no051
    This exploit generates a html file that contains the exploit. The html
    file executes "c:\windows\welcome.exe" on the victim host. This is
    tested on Windows98(Japanese).
    
    
    (2) BTD STUDIO ZOM-MAIL 1.09
    
    Problem:
    Internet Mailer "ZOM-MAIL 1.09" for Windows contains the buffer overflow
    bug. If the long attachment file name is contained in the recived mail, the
    buffer overflow occurs when ZOM-MAIL pops such mail from pop server. If
    attacker sets the exploit in the filename, user's host will be cracked
    by the any instructions written in the filename area.
    
    Solution:
    Before you pop your mail by ZOM-MAIL, you check your mail by using other
    mailer that don't contain same bug.
    
    Exploit:
    http://shadowpenguin.backsection.net/toolbox.html#no050
    This exploit removes a file "c:\\windows\\test.txt". This is tested on
    Windows98(Japanese)
    
    
    (3) AN-HTTPd 1.20b
    
    Problem:
    The test CGIs which are distributed with AN-HTTPd 1.20b contain the
    remote command execution problem.
    
    Solution:
    [1] remove the following test CGIs.
        cgi-bin/test.bat
        cgi-bin/input.bat
        cgi-bin/input2.bat
        ssi/envout.bat
    [2] Ver1.21 has been released at the official site.
        http://www.st.rim.or.jp/~nakata/
    
    Exploit:
    (example)
    http://www.xxx.yy/cgi-bin/input.bat?|dir..\..\windows
    
    
    (4) IBM HomePagePrint 1.0.7
    
    Problem:
    Web page printout software "IBM HomePagePrint 1.0.7" contains the buffer
    overflow bug. If the long string is specified in IMG_SRC tag, the buffer
    overflow occurs. If attacker sets the exploit on the webpage, visitor's
    host will be cracked by the any instructions written in the IMG_SRC tag.
    
    Solution:
    Patch can be download at:
    http://www.ibm.co.jp/software/internet/hpgprt/down2.html
    
    Exploit:
    http://shadowpenguin.backsection.net/toolbox.html#no045
    This exploit execute "c:\windows\notepad.exe" on the victim host. This
    is tested on Windows98(Japanese).
    
    
    (5) uum
    
    Problem:
    This is a suid program which is installed many kind of UNIXs for Japanese
    edition with default. It overflows if the long argment is specified with
    -D option, the local user can obtain root privilege.
    
    Exploit:
    http://shadowpenguin.backsection.net/toolbox.html#no046
    This exploit is for Turbo Linux3, the local user can obtain a root
    privilege. We also confirmed this overflow on the following UNIXs.
    Solaris 2.6,2.7, IRIX 5.3,6.2,6.3,6.4,6.5
    (uum is installed with default)
    In other case, we can not check.
    
    
    (6) canuum
    
    Problem:
    This is a suid program which is installed some Linux distributions for
    Japanese edition with default. It overflows if the long argment is
    specified with some option specifications such as -k,-c,-n, the local
    user can obtain root privilege.
    
    Exploit:
    http://shadowpenguin.backsection.net/toolbox.html#no047
    This exploit is for Turbo Linux3, the local user can obtain a root
    privilege.
    
    -----
    UNYUN
    % The Shadow Penguin Security [ http://shadowpenguin.backsection.net ]
       shadowpenguinat_private (webmaster)
    % eEye Digital Security Team [ http://www.eEye.com ]
       unyunat_private
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:09:27 PDT