60 likes | 156 Views
Windtop bpop3d Vulnerability. timhsu @ chroot.org. July 2005. Windtop BBS. BBS developed from Maple-3 Easy install and friendly. Buffer overflow. static void cmd_user(cn) Client *cn; { int fd; ACCT acct; char *userid, *ptr, fpath[80], msg[128]; MYDOG;
E N D
Windtop bpop3d Vulnerability timhsu @ chroot.org July 2005
Windtop BBS • BBS developed from Maple-3 • Easy install and friendly
Buffer overflow static void cmd_user(cn) Client *cn; { int fd; ACCT acct; char *userid, *ptr, fpath[80], msg[128]; MYDOG; if (cn->mode >= CM_LOGIN) { cmd_xxxx(cn); return; } userid = parse_token(NULL, LOWER); if (!userid || !*userid) { do_argument(cn); return; } sprintf(msg, "-ERR %s has no mail here", userid);
RCVBUFSIZ • Maple-3 • #define SNDBUFSIZ (256 * 14) • #define SNDLINSIZ 256 /* Thor.990522: 註解: 送出每行最長 */ • #define RCVBUFSIZ 128 /* Thor.990522: 註解: 收到每行最長 */ • Windtop • #define SNDBUFSIZ (256 * 32) • #define SNDLINSIZ (1024) • #define RCVBUFSIZ (1024)
Exploit • http://www.chroot.org/docs/2004/writing_remote_exploit.pdf • Exploit works on Linux and FreeBSD both • Test on my VMware successfully • Release the exploit after windtop fix the bug.
Thank You ~ END ~