|
Vulnerability Sambar Affected Sambar Server 4.3 Description Following is based on Delphis Consulting Plc Security Team Advisory. It wastested on Windows NT v4.0 Workstation (SP6). Delphis Consulting Internet Security Team (DCIST) discovered the following vulnerability in the Sambar Server under Windows NT. By using the default finger script shipped with Sambar server it is possible to cause an Buffer overrun in sambar.dll overwriting the EIP allowing the execution of arbitry code. This is done by sending a large hostname in the required field. The string has to be a length of 32286 + EIP (4 bytes) making a total of 32290 bytes. Using, GET /session/finger?host=long_string_here you can still make it (providing an url can be that long). Or better, use a POST request, posted from another computer to the Sambar Server. From the research it seems the problem also exists in a number of scripts which rely on sambar dll functionality this includes but is not limited to: o whois demonstration script o finger demonstration script Solution The only fix, is to change or remove the following line in config.ini, as follows: INIT = samples.dll:netutils_init to: # INIT = samples.dll:netutils_init