exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mgsoft-multi.txt

mgsoft-multi.txt
Posted Mar 17, 2008
Authored by Luigi Auriemma | Site aluigi.org

MG-Soft Net Inspector versions 6.5.0.828 and below suffer from format string, directory traversal, and denial of service vulnerabilities. Full details provided.

tags | exploit, denial of service, vulnerability
SHA-256 | 569933884f922aa4da88c94d045a864a94684cbeacbddf1feda28ac6a29f36fc

mgsoft-multi.txt

Change Mirror Download

#######################################################################

Luigi Auriemma

Application: MG-SOFT Net Inspector
http://www.mg-soft.com/netinsp.html
(bug C affects any MgWTrap3 service which is included in
almost all the MG-SOFT products like MIB Browser, Query
Manager, Trap Ringer Pro and so on)
Versions: Net Inspector <= 6.5.0.828
Platforms: Windows and Linux
Bugs: A] format string in mghttpd
B] directory traversal in mghttpd
C] crash in MgWTrap3
D] Denial of Service in niengine
Exploitation: remote
Date: 14 Mar 2008
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org


#######################################################################


1) Introduction
2) Bugs
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


>From vendor's website:
"MG-SOFT Net Inspector is a powerful fault management application with
alarming subsystem that complies with the international alarm reporting
recommendations (ITU X.733). The software lets you effectively monitor
the status of network devices and manage alarms associated with devices
in the supervised TCP/IP network."


#######################################################################

=======
2) Bugs
=======

---------------------------
A] format string in mghttpd
---------------------------

mghttpd is a simple HTTP daemon running on port 5228 used to allow the
clients to download the Net Inspector Java Client.
This server is affected by a format string vulnerability located in the
function which logs the clients requests in the log file.


---------------------------------
B] directory traversal in mghttpd
---------------------------------

This service is also affected by a classical directory traversal
vulnerability using both the slash and backslash plain delimiters which
can be exploited to download files from the disk on which is located
the server.


--------------------
C] crash in MgWTrap3
--------------------

The SNMP Trap Service other than binding the local TCP port 8888 and
the UDP 162 for collecting SNMP queries, binds also an additional UDP
port which changes each time the service is executed (uses the first
free available port).
Sending a packet (empty or with any desired content since it's not
important) directly to this port raises an exception which terminates
the service immediately.
This service is the core of almost all the MG-SOFT products which so
result all vulnerable.


--------------------------------
D] Denial of Service in niengine
--------------------------------

The Net Inspector Fault Management server (niengine) can be easily
freezed with CPU at 100% and full memory consumption through a
malformed or incomplete packet.


#######################################################################

===========
3) The Code
===========


A]
GET /%n%n%s%s%n%n%n%s HTTP/1.0

B]
GET ../../../../boot.ini HTTP/1.0
GET \../..\../..\windows/win.ini HTTP/1.0

C]
echo|nc SERVER PORT -v -v -u

D]
echo -n -e \x2a\x45\x67\xf2\x00\x00\x00\x00|nc SERVER 5221 -v -v -w 1


#######################################################################

======
4) Fix
======


No fix


#######################################################################


---
Luigi Auriemma
http://aluigi.org
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close