DESCRIPTION

"Gordano Messaging Suite is the powerful messaging server running on Windows, Linux, Solaris and AIX. It is being used by over twenty four thousand customers,in more than ninety countries, covering all sectors (Airlines, Government Agencies, Education,Industry, etc..)"

Gordano Messaging Suite is being widely used by some major organizations such as Compaq, Xerox, NASA, Cisco System, AT&T, FedEx.

More information at http://www.gordano.com.

SUMMARY

PRODUCT Gordano Messaging Suite
VENDOR Gordano
AFFECTED VERSIONS Gordano Messaging Suite version 9, build 3138
SEVERITY
IDENTIFIER N/A
TESTED PLATFORM Windows 2000, Windows XP Professional, Linux(x86)

E-CQURITY found several security flaws in the software that could result in DoS attack against the GMS application and sensitive information disclosure if exploited by the attacker.

IMPACT

Remote Denial of service

Information Disclosure

DETAILS

[Vulnerability #1] Remote DoS

The program x:\/bin/WWW.exe listens on the following ports to provide GMS Administration, WebMail Professional, WebMail Express, WebMail Mobile, Instant Messaging, and Web Server services to users: 80, 8000, 8025, 8081, 8888, 9000. When a user sending a request like this /../.. to GMS Web Server at port 80 will cause the WWW.exe process terminated and all services that WWW.exe provides shutdown immediately.

~$ telnet 192.168.1.69 Trying 192.168.1.69... Connected to 192.168.1.69 Escape character is '^]'. GET /../.. HTTP/1.0 Connection closed by foreign host.

On Linux, the vulnerability doesnt cause the /gordano/bin/WWW process terminated but it never times out and if an attacker opens up 15-20 connections sending /../.. requests it will probably enough to keep GMS Server busy and deny providing services to other legitimate users.

Restarting the service is needed in order to gain normal functionality.

[Vulnerability #2] Information Disclosure (require valid user credential)

The script alertlist.mml provides information about users who have logged in to the GMS Server and discloses some useful information to the attacker, such as usernames, domains, login time, and et al. Its supposed to be accessed by GMS Server's Administrator only but a normal WebMail user can also access to that script without the need of login as an admin.

PROOF OF CONCEPT

[Vulnerability #2] Information Disclosure (require valid user credential)

The script can be normally accessed through http://www.victim.com:8000/admin/reports/alertlist.mml.

VENDOR STATUS

Vendor has verified and released a patch that addresses the issues.

CREDIT

Phuong Nguyen

DISCLOSURE TIMELINE

N/A

APPENDIX

N/A

REFERENCES

N/A