Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:OVERFLOW:LINUX-X86-3

Severity

High

Recommended

No

Recommended Action

Drop

Category

IMAP

Keywords

Linux x86 Buffer Overflow (3)

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Linux x86 Buffer Overflow (3)


This signature detects attempts to exploit a known vulnerability in IMAPd. Versions Netscape Messaging Server 3.55 and University of Washington IMAPd 10.234 are susceptible. IMAPd supports an AUTHENTICATE command that specifies the authentication mechanism to open a mailbox. A value is passed to the authenticate command and then copied into a buffer. Attackers can remotely specify a value to overflow the buffer and execute arbitrary code, in some cases as root.

Extended Description

A vulnerability exists in certain imapd implementations that allow an attacker to execute arbitrary code remotely. In certain instances, the code to be executed will be run with root privilege. Imap supports a command 'AUTHENTICATE' which specifies the type of authentication mechanism to be used to open a mailbox. The value passed to the authenticate command is copied into a buffer of size 1024. The maximum size of this value, however, it 8192 characters. A failure to bound the read value to 1024 results in a buffer overflow. The code which creates this problem is as follows: char *mail_auth (char *mechanism,authresponse_t resp,int argc,char *argv[]) { char tmp[MAILTMPLEN]; AUTHENTICATOR *auth; /* make upper case copy of mechanism name */ ucase (strcpy (tmp,mechanism)); for (auth = mailauthenticators; auth; auth = auth->next) if (auth->server && !strcmp (auth->name,tmp)) return (*auth->server) (resp,argc,argv); return NIL; /* no authenticator found */ } The 'strcpy' command on the sixth line of code will copy the value of 'mechanism', which is up to 8192 characters in to the 'tmp' buffer, which is only 1024 characters. All versions of UW imapd up to, and including 10.234 should be considered vulnerable.

Affected Products

  • Netscape Messaging Server 3.55.0
  • University of Washington imapd 10.234.0

References

  • BugTraq: 130
  • CVE: CVE-1999-0005
  • URL: http://www.securityfocus.com/advisories/267

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out