[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : AnalogX Proxy Server DoS/Buffer Overflow Vulnerabilty

Title: AnalogX Proxy Server DoS/Buffer Overflow Vulnerabilty
Released by: Network Security Solutions Inc
Date: 29th November 2000
Printable version: Click here
>From "zer0-logic" :





           Network Security Solutions Inc. Security Advisory

                     ( Philippine based Security Company )

                          http://www.nssolution.net

                             http://connect.to/nssi



         ]** AnalogX Proxy Server DoS/Buffer Overflow Vulnerabilty **[



                       Author: Abraham Lincoln H.

                      Handle: zer0logic



         Email : Abraham@Nssolution.net, zer0logic@Privacyx.Com

                     lincoln@privacyX.com, KnowledgeBase@Lycos.com



Date Discovered: November 15, 2000

            Vendor:   AnalogX.Com

Version Affected: AnalogX Proxy Server release 4.10

                           for Win 95 / 98 / NT / Win2k

   Local : Yes

Remote: Yes

     Risk: High



Problem Description:



      NSSI Team has discovered a Local/Remote Buffer Overflow/DoS

Vulnerabiltiy on AnalogX Proxy Server that could allow a Malicious

Attacker to disable the whole proxy server by just attacking a single

analogX proxy service.



Vulnerable Proxy Services; FTP, POP3, SMTP and Proxy Logger



        The Problem lies when FTP Service is ON and Logging is enabled or

disabled, or SMTP Service is ON and Logging is enabled or disabled, POP3

Service is ON and logging is enabled. When the Attacker Sends a Multiple

Abnormal Strings to a certain affected service it causes the whole Proxy to Shutd0wn.

the proxy needs to re-start again to perform normal operation.



OUTPUT Error Message when Logging is Disabled:



    FTP Service error msg.:

                ABORT: Memory corrupt before (10241)

                            (PROTO\ftp.c\523)



  SMTP Service error msg.:

                ABORT: Memory corrupt before (10241)

                            (PROTO\smtp.c\379)



OUTPUT Error message when Logging is Enabled:



    FTP Service error msg.:

                    ABORT: Last String too large for Buffer (1509 > 1024)

                                (log.c/114)



   POP3 Service error msg.:

                           ABORT: Last String too large for Buffer (1509 > 1024)

                                       (log.c/114)



 SMTP Service error msg.:

                   ABORT: Last String too large for Buffer (10301 > 1024)

                        (log.c/114)



NOT Affected Services:

                              HTTP Proxy: 6588

                             Socks Proxy: 1080

                                       NNTP: 119



Work Around:

            Disable FTP Proxy service

            Disable SMTP Proxy service

            Disable POP3 Proxy service if Logging is enabled



Vendor Status: AnalogX has been notified of this Vulnerability but no patch has been issued.



Related Links:  http://www.nssolution.net

                         http://connect.to/nssi



Feedback and Inquiries:

            If you have any questions, inquiries, feedback, concerns and

updates pls don't hesitate to email us.



For Inquiries,Concerns and updates - Info@nssolution.net



for Comments and Questions - Abraham@nssolution.net, lincoln@privacyx.com

                                             zer0logic@privacyx.com



Disclaimer:

        This paper is intended for informational purpose only. We are not

responsible for the the  Use and/or potential effects of these advisories.

Read this at your own risk or not at all.



Copyright(c) 2000-2001 Network Security Solutions Inc.

Permission is herby granted for the redistribution of this alert

electronically. if you wish to reprint or modify this document Contact us

1st or email us at: info@nssolution.net








(C) 1999-2000 All rights reserved.