TUCoPS :: Unix :: General :: csmproxy.txt

CSM Proxy 4.1 contains a buffer overflow in its FTP service.


[ http://www.rootshell.com/ ]

Date:         Thu, 16 Jul 1998 15:22:24 -0400
From:         Security Research Team <security@SIAMRELAY.COM>
Subject:      S.A.F.E.R. Security Bulletin 980708.DOS.1.1

__________________________________________________________

      S.A.F.E.R. Security Bulletin 980708.DOS.1.1
__________________________________________________________


TITLE     : Vulnerability with CSM Proxy 4.1
DATE      : July 8, 1998
NATURE    : Denial-of-Service
PLATFORMS : Windows NT, Windows 95/98

DETAILS:

If users sends 1030 characters or more to the FTP port (21), CSM Proxy will
crash, and raise CPU usage to 100%. Restart of the proxy (Win95) or reboot
(NT) is needed in order to recover system functionality.

CSM Proxy accepts connection, even accepts username/password, and then
checks if user is authorized (depending on source IP address) to access
proxy server at all. This allows any user on Internet/Intranet to connect
to port 21, send characters and crash the CSM Proxy server along with
Windows NT. If CSM Proxy is located behind a firewall, only Intranet users
are a threat.

FIXES:

CSM (http://www.csm-usa.com and http://www.csm.co.at) have been notified,
and it is expected that CSM will publish updated version soon.

__________________________________________________________

   S.A.F.E.R. - Security Alert For Entreprise Resources
          Copyright (c) 1998  Siam Relay Ltd.
 http://siamrelay.com/safer  ---  security@siamrelay.com
__________________________________________________________

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH