GEN:SID | 1:2433 |
Message | WEB-CGI MDaemon form2raw.cgi overflow attempt |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in a CGI web application running on a server.
|
Impact | Possible unauthorized administrative access to the server or application. Possible execution of arbitrary code of the attackers choosing.
|
Detailed Information | MDaemon is mail server software for Microsoft Windows systems. It uses a CGI web interface to send email. The email form used to submit the message does not properly check user supplied input. This may result in an attacker being able to supply a "From" field larger than 249 bytes which may in turn cause an error condition to occur in the executable file handling the form input. This error may present the attacker with the opportunity to gain administrative access to the server and also execute code of their choosing.
This event is generated when an attempt is made to gain unauthorized access to a CGI application running on a web server. Some applications do not perform stringent checks when validating the credentials of a client host connecting to the services offered on a host server. This can lead to unauthorized access and possibly escalated privileges to that of the administrator. Data stored on the machine can be compromised and trust relationships between the victim server and other hosts can be exploited by the attacker.
If stringent input checks are not performed by the CGI application, it may also be possible for an attacker to execute system binaries or malicious code of the attackers choosing.
|
Affected Systems | Alt-N MDaemon 6.5.2 Alt-N MDaemon 6.7.5, 6.7.9 Alt-N MDaemon 6.8.0 through 6.8.5
|
Attack Scenarios | An attacker can access an authentication mechanism and supply his/her own credentials to gain access. Alternatively the attacker can exploit weaknesses to gain access as the administrator by supplying input of their choosing to the underlying CGI script.
|
Ease of Attack | Simple. Exploits exist.
|
Corrective Action | Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.
|
Additional References | |
Rule References | bugtraq: 9317
url: secunia.com/advisories/10512/
|