Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Subject: Avirt Mail 4.x DoS
From: Steve (steveSECURESOLUTIONS.ORG)
Date: Mon Oct 23 2000 - 11:08:18 CDT
- Next message: Steve: "Re: Possible security issue in NAV2001 on Windows ME"
- Previous message: Mark Loveless: "VLAD the Scanner v0.7.4"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Dicovered and reported by: Martin [martin_oALGONET.SE]
Avirt Mail 4.x up to latest version is vulnerable to denial of service
while handling a SMTP session.
Avirt Mail 4.0 (build 4124) - vulnerable
Avirt Mail 4.2 (build 4807) - vulnerable
Both versions where tested on Windows 98 since I do not have access to
the more expensive Windows systems, however any win32 system ought to
When connecting to port 25 on a computer running any of the above
mentioned versions of Avirt Mail, it is possible to crash the server by
supplying an unusually long from- or recieptant-address. The crash
occurs when the connection to the client is closed.
If 272 or more characters are supplied after "RCPT TO:" the server will
crash as soon as the session is closed and no more connections will
be allowed until the server has been restarted. The attack will not be
logged by Avirt Mail. The server will crash both if the session is
aborted before completing the mail or if a "DATA" command is sent.
Wether the connection is closed by quit or by a dropped connection
makes no difference.
If 556 or more characters are supplied after "MAIL FROM:" there are
two possible outcomes:
1. If "RCPT TO:" and "DATA" commands are appended, the server will not
crash, the server will store the message with the search-path to the
SMTPOut directory at the end of the FROM-line. If a real TO-address
where to be used, this will processed as a normal mail. No exception
log will be made.
2. If the session is aborted directly after the "MAIL FROM:" command,
the server will crash without logging the attack and no more connections
will be allowed before the server is restarted.
These flaws are probably due to insufficient bounds-checking somewhere
in the code, leading to an overflow in either the array holding the
from- or recieptant-address.
The flaws are demonstrated in the attached code (win32 console code).
The program when compiled takes two arguments:
Where type can be one of the following
1 - Overflow in RCPT TO: command. (aborted session)
2 - Overflow in MAIL FROM: command. (aborted session)
3 - Overflow in RCPT TO: command. (finnished session)
2 - Overflow in MAIL FROM: command. (finnished session)
From the researching I have done, these flaws does not seem to be
exploitable (in the means of running arbitary code on the computer
running the server). Therefore, they do not pose as a direct integrity
thread, but mere as a DoS threat.
This conclusion may however be proven wrong.
Complying to the Software License agreement, I have not in any way tried
to reconstruct the sourcecode of Avirt Mail. All conclusions have been
made by examining the in- and out-put of the program and the state of
processor registers at crash-time.
Avirt was informed about this by mail Sep 7 2000, with the notice that
the information was going to be released as full disclosure in 40 days
without further notice if they hadn't issued information by then.
Sep 8 2000 Avirt confirmed the mail and told they had forwarded the
information to their developers.
Avirt has not been in contact since then and no update has been released
on their homepage. More than forty days has passed.
Information about Avirt and a trial version of Avirt Mail can be found at
(this report and the attached file is also available here)
** TO UNSUBSCRIBE, send the command "UNSUBSCRIBE win2ksecadvice"
** FOR A WEEKLY DIGEST, send the command "SET win2ksecadvice DIGEST"
SEND ALL COMMANDS TO: listservlistserv.ntsecurity.net