SPIKE 2.5 and associated vulnerabilities in Microsoft SQL Server and Exchange 2000

From: Dave Aitel (dave@immunitysec.com)
Date: Tue Aug 06 2002 - 10:46:36 EDT


SPIKE 2.5 is now available at http:/www.immunitysec.com/spike.html

This release (see the "audits" directory) includes:
  o one new remotely exploitable pre-auth bug on all versions of
Microsoft SQL Server. I call it the "Hello" bug as in "You had me at
hello" since the overflow occurs during the first possible opportunity.
For reference, the bug itself is on TCP port 1433, and is a remote
SYSTEM bug in the default configurations tested. There are some
restrictions on the process's access token, but this is easily taken
care of in many ways.

  o Several new vulnerabilities in Microsoft Exchange 2000
      o 2 remote unauthenticated Access Violations via MSRPC (kills the
MTA, may be remotely exploitable, but I haven't looked into it)
      o 1 vulnerability in the MSRPC endpoint for the MTA that uses all
available memory and sometimes bluescreens the box. This vulnerability
is also unauthenticated, and also may be exploitable. You can use
dcedump (now included with SPIKE) to locate the port the MTA endpoints
are on.
      o 1 post-auth vulnerability - rapid requests from an authenticated
user will quickly exhaust the licenses granted by IIS to the Exchange
server and cause the service to become unavailable until IIS anbd
Exchange 2000 are restarted.

In addition, this release contains SPIKE Proxy 1.1.1 (minor bugfix
release over 1.1 - GET /file.ext/arg=variable is now treated properly),
updated SPIKE msprcfuzz and "generic" support, and many other bugfixes.

Dave Aitel
Immunity, Inc
http://www.immunitysec.com/

(Credit goes to someone in eEye/CoreSDI for the clever name for the SQL
server bug, if I recall correctly. It was a busy party and I forget
exactly who told me that joke, which I shamelessly used during my
BlackHat talk. )





This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:24 EDT