SPIKE 2.5 and associated vulns

From: Dave Aitel (daveat_private)
Date: Mon Aug 05 2002 - 17:02:44 PDT

  • Next message: Alex Lambert: "Re: In regards to the insecurity of AOL Instant Messenger"

    SPIKE 2.5 is now available at http:/www.immunitysec.com/spike.html
    
    This release (see the "audits" directory) includes:
      o one new remotely exploitable pre-auth bug on all versions of
    Microsoft SQL Server. I call it the "Hello" bug as in "You had me at
    hello" since the overflow occurs during the first possible opportunity.
    For reference, the bug itself is on TCP port 1433, and is a remote
    SYSTEM bug in the default configurations tested. There are some
    restrictions on the process's access token, but this is easily taken
    care of in many ways. 
    
      o Several new vulnerabilities in Microsoft Exchange 2000
          o 2 remote unauthenticated Access Violations via MSRPC (kills the
    MTA, may be remotely exploitable, but I haven't looked into it)
          o 1 vulnerability in the MSRPC endpoint for the MTA that uses all
    available memory and sometimes bluescreens the box. This vulnerability
    is also unauthenticated, and also may be exploitable. You can use
    dcedump (now included with SPIKE) to locate the port the MTA endpoints
    are on.
          o 1 post-auth vulnerability - rapid requests from an authenticated
    user will quickly exhaust the licenses granted by IIS to the Exchange
    server and cause the service to become unavailable until IIS anbd
    Exchange 2000 are restarted.
    
    In addition, this release contains SPIKE Proxy 1.1.1 (minor bugfix
    release over 1.1 - GET /file.ext/arg=variable is now treated properly),
    updated SPIKE msprcfuzz and "generic" support, and many other bugfixes.
    
    Dave Aitel
    Immunity, Inc
    http://www.immunitysec.com/
    
    (Credit goes to someone in eEye for the clever name for the SQL server
    bug, if I recall correctly. It was a busy party and I forget exactly who
    told me that joke, which I shamelessly used during my BlackHat talk. )
    
    
    



    This archive was generated by hypermail 2b30 : Tue Aug 06 2002 - 11:44:21 PDT