Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11562
HistoryFeb 24, 2006 - 12:00 a.m.

NSA Group Security Advisory NSAG-№198-23.02.2006 Vulnerability The Bat v. 3.60.07

2006-02-2400:00:00
vulners.com
24

Advisory:
NSAG-№198-23.02.2006

Research:
NSA Group [Russian company on Audit of safety & Network security]

Site of Research:
http://www.nsag.ru or http://www.nsag.org

Product:
The Bat v. 3.60.07

Site of manufacturer:
www.ritlabs.com

The status:
19/11/2005 - Publication is postponed.
19/11/2005 - Manufacturer is notified.
12/12/2005 - Answer of the manufacturer.
22/02/2006 - Publication of vulnerability.

Original Advisory:
http://www.nsag.ru/vuln/953.html

Risk:
Critical

Description:
Vulnerability exists owing to insufficient check of the size of the buffer of a variable
in which it is copied data from field Subject.

Influence:
The malefactor is capable to execute an any code on a computer of the addressee of the letter.

Exploit:
If a field subject == 4038 bytes at reception of such letter there is an overflow of the buffer and
Rewriting of registers EIP and EBP, that allows the malefactor to execute
Any code in a context vulnerable The Bat appendices.
Exemple:

Subject:AAAAAAAAAAA… 4038… AABB
A=0x41 (hex)
B=0x42 (hex)

Condition of a code, at the moment of overflow:
New Entery point:
00420042 FE???; Unknown command // Performance of an any code!!!

Condition of registers:
EAX 01CCC4A4
ECX 00000000
EDX 0012FA5C
EBX 02A4EB40
ESP 0012F9EC
EBP 00410041 thebat.00410041

   A A 

ESI 00000004
EDI 02A231F0
EIP 00420042 thebat.00420042

   B B 

Decision:
Download new version.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Our company is the independent auditor of the software in market IT.
At present independent audit of the software becomes the standard practice
and we suggest to make a let out product as much as possible protected from a various sort of attacks of
malefactors!

www.nsag.ru
«Nemesis» © 2006

Nemesis Security Audit Group © 2006.