14th Apr 2003 [SBWID-6146]
COMMAND
Gaim-Encryption Plugin heap corruption
SYSTEMS AFFECTED
gaim-encryption 1.15 and earlier
PROBLEM
In Rapid7 Advisory R7-0013 [http://www.rapid7.com/]:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Rapid7, Inc. Security Advisory
Visit http://www.rapid7.com/ to download NeXpose, the
world's most advanced vulnerability scanner.
Linux and Windows 2000/XP versions are available now!
_______________________________________________________________________
Rapid7 Advisory R7-0013
Heap Corruption in Gaim-Encryption Plugin
Published: April 11, 2003
Revision: 1.0
http://www.rapid7.com/advisories/R7-0013.html
CVE: CAN-2003-0163
Bugtraq ID: 7182
1. Affected system(s):
KNOWN VULNERABLE:
o gaim-encryption 1.15 and earlier
NOT VULNERABLE:
o gaim-encryption 1.16 and later
2. Summary
GAIM is a multi-protocol instant messaging client that is
compatible with AIM, ICQ, MSN Messenger, Jabber, and other
protocols. The Gaim-Encryption plugin provides transparent
message encryption between two users.
The Gaim-Encryption plugin does insufficient validation on the
message length parameter supplied by a remote user. This allows
an arbitrary heap location to be overwritten with a zero byte
and will also cause an unbounded read into the heap.
The most obvious impact of this vulnerability would be a denial
of service to the GAIM client. While this vulnerability is not
likely to be exploitable, exploitation cannot be ruled out.
Please note that Gaim-Encryption is not part of GAIM and is not
developed by GAIM.
3. Vendor status and information
William Tompkins <bill AT icarion DOT com>
http://gaim-encryption.sourceforge.net/
The author was notified and a fixed version was released on
March 16th, 2003.
4. Solution
Upgrade to version 1.16 of the Gaim-Encryption plugin. Note that
while a patched version of 1.15 was released, some versions of
1.15 may still be vulnerable.
5. Detailed analysis
The decrypt_msg function is responsible for decrypting encrypted
GAIM messages. It reads the message length from a user-supplied
header using sscanf. While some bounds checking is performed, a
negative length is not properly handled. This causes the NUL
termination of the message string to place a zero byte in an
arbitrary location in memory rather than at the end of the string
where it belongs.
6. Contact Information
Rapid7 Security Advisories
Email: [email protected]
Web: http://www.rapid7.com/
Phone: +1 (212) 558-8700
8. Disclaimer and Copyright
Rapid7, Inc. is not responsible for the misuse of the information
provided in our security advisories. These advisories are a service
to the professional security community. There are NO WARRANTIES
with regard to this information. Any application or distribution of
this information constitutes acceptance AS IS, at the user's own
risk. This information is subject to change without notice.
This advisory Copyright (C) 2003 Rapid7, Inc. Permission is
hereby granted to redistribute this advisory, providing that no
changes are made and that the copyright notices and disclaimers
remain intact.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0
iQA/AwUBPpcmgiT52JC2U8wAEQKc4ACfbhx2R3ogtcV71xymR/ExjqSckQIAoIxh
GuzV+92KF3r6hFJ3dTZGRFVs
=J9Hm
-----END PGP SIGNATURE-----
SOLUTION
Upgrade