NT SLMail Remote Administration Service Vulnerability

The Remote Administration Service for SLMail 3.1 and 3.2 introduces a vulnerability whereby NTFS permissions can be bypassed.

Remote Administration Service provides a web-based interface to make changes to the SLMail configuration. The default port for this is TCP 180. NTLM authentication can be enabled, but even then all administrative requests are serviced with System privileges, not those of the authenticated user. They can then set any user's finger file (equivalent to the Unix .plan file) to any valid file on the system. The finger server is part of slmail.exe, which is running as System, so it is possible to retrieve any text-based file's contents, regardless of that file's NTFS settings, simply by setting it to the finger file of an SLMail user and then fingering that user. Even if the finger service has been disabled, it can be re-enabled via the Remote Administration Service.


Privacy Statement
Copyright 2010, SecurityFocus