Multiple vulnerabilities in UNIX & Windows 9x/NT applications
----------------------------------------------------------------------------
----


SUMMARY

The following applications were recently tested and discovered to contain 
various security holes:
1) YAMAHA MidiPlug 1.10b
2) ZOM-MAIL 1.09
3) AN-HTTPd 1.20b
4) HomePagePrint 1.0.7
5) Uum 4.2
6) Canuum 3.5b2

DETAILS

YAMAHA MidiPlug 1.10b

Problem:
Midi-Plugin program "YAMAHA MidiPlug 1.10b-j" for Windows IE4/5 contains a 
buffer overflow bug. If a long "TEXT" variable is specified in EMBED tag, 
a buffer overflow can occur.

Solution:
By disabling the "Run ActiveX control and plug-ins" (Internet Explorer's 
security settings), you can stop this vulnerability from affecting you.

Exploit:
An exploit code that generates a HTML file that contains the EMBDED TAG 
that executes "c:\windows\welcome.exe" on the victim's host, can be 
downloaded from:  
<http://shadowpenguin.backsection.net/toolbox.html#no051> 
http://shadowpenguin.backsection.net/toolbox.html#no051.


BTD STUDIO ZOM-MAIL 1.09

Problem:
Internet Mailer "ZOM-MAIL 1.09" for Windows contains the buffer overflow 
bug. If a long attachment file name is contained in the received mail, a 
buffer overflow occurs when ZOM-MAIL downloads such an email from POP 
server.

Solution:
No solution is available at this time.

Exploit:
An exploit code that removes the file "c:\\windows\\test.txt", can be 
downloaded from:  
<http://shadowpenguin.backsection.net/toolbox.html#no050> 
http://shadowpenguin.backsection.net/toolbox.html#no050


AN-HTTPd 1.20b

Problem:
The tests CGIs that are distributed with AN-HTTPd 1.20b contain a remote 
command execution problem.

Solution:
1. Remove the following test CGIs.
    cgi-bin/test.bat
    cgi-bin/input.bat
    cgi-bin/input2.bat
    ssi/envout.bat
2. Get Ver1.21 from the official site:
     <http://www.st.rim.or.jp/~nakata/> http://www.st.rim.or.jp/~nakata/

Exploit:
The following is an example on how to exploit the vulnerable CGIs:
http://www.example.com/cgi-bin/input.bat?|dir..\..\windows


IBM HomePagePrint 1.0.7

Problem:
Web page printout software "IBM HomePagePrint 1.0.7" contains a buffer 
overflow bug. If a long string is specified in IMG_SRC tag, a buffer 
overflow occurs.

Solution:
A patch can be downloaded from: 
 <http://www.ibm.co.jp/software/internet/hpgprt/down2.html> 
http://www.ibm.co.jp/software/internet/hpgprt/down2.html

Exploit:
An exploit code that executes "c:\windows\notepad.exe" on the victim's 
host, can be downloaded from:
 <http://shadowpenguin.backsection.net/toolbox.html#no045> 
http://shadowpenguin.backsection.net/toolbox.html#no045


Uum

Problem:
Uum is a suid program, which is installed on many UNIX flavors Japanese 
edition by default. It can be caused to buffer overflow if a long argument 
is passed with the '-D' option, a local user can obtain root privilege.

Exploit:
An exploit source code is available for Turbo Linux3.
The overflow was confirmed to work on the following UNIX flavors:
 * Solaris 2.6,2.7
 * IRIX 5.3,6.2,6.3,6.4,6.5
The exploit code can be downloaded from:
 <http://shadowpenguin.backsection.net/toolbox.html#no046> 
http://shadowpenguin.backsection.net/toolbox.html#no046


Canuum

Problem:
Canuum is a suid program that is installed on some Linux distributions for 
Japanese edition by default. It can be caused to overflow if a long 
argument is passed with any of the following options '-k', '-c', '-n', a 
local user can obtain root privileges.

Exploit:
An exploit source code is available for Turbo Linux3, and can be 
downloaded from:
 <http://shadowpenguin.backsection.net/toolbox.html#no047> 
http://shadowpenguin.backsection.net/toolbox.html#no047


ADDITIONAL INFORMATION

The vulnerabilities were reported by:  
<mailto:[EMAIL PROTECTED]> UNYUN.



======================================== 

-------
AFLHI 058009990407128029/089802---(102598//991024)


    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke