copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ASB-2011.0098.2 - UPDATE ALERT [Win] NJStar Software: Execute arbitrary code/commands - Remote/unauthenticated

Date: 08 November 2011

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2011.0098.2
          A vulnerability has been identified in NJStar MiniSmtp
                              8 November 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              NJStar Communicator Version 3
                      NJStar Chinese Word Processor Version 5.30
                      NJStar Japanese Word Processor Version 5.30
                      NJStar Express Mail
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           None
CVE Names:            CVE-2011-4040  
Member content until: Thursday, May  3 2012

Revision History:     November 8 2011: Patches released
                      November 3 2011: Initial Release

OVERVIEW

        A vulnerability has been identified in multiple NJStar products 
        including, but not limited to NJStar Communicator, NJStar Chinese Word 
        Processor, NJStar Japanese Word Processor & NJStar Express Mail.


IMPACT

        A MiniSmtp server listening on port TCP/25 is provided with NJStar 
        Communicator, NJStar Chinese Word Processor, NJStar Japanese Word 
        Processor & NJStar Express Mail & possibly other NJStar products.
        
        A vulnerability exists in this MiniSmtp server which can be exploited 
        using malicious packets to cause a Stack Buffer Overflow.
        
        An attacker with network access to the NJStar Communicator MiniSmtp 
        server could access the system with administrative privileges and 
        potentially compromise the underlying host. [1]
        
        Exploit code has been released publicly, existing also as a 
        Metasploit module [2]
        
        UPDATE: NJStar Chinese Calendar was also vulnerable. [3]


MITIGATION

        We understand that the vulnerable MiniSmtp server is not running by 
        default, however it is started the first occasion a user sends an email 
        message using one of the NJStar products. 
        
        Therefore a possible mitigation measure may be to check for the NJStar 
        MINISMTP.exe process and if found to terminate it. It may be possible 
        to prevent it from running by not sending email using NJStar products.
        
        UPDATE: NJStar has released updates to correct this vulnerability. The
        following releases have been made:
        
          - NJStar Communicator 3.00.11918
          - NJStar Chinese Word Processor 5.30.11918
          - NJStar Japanese Word Processor 5.30.11918
          - NJStar Chinese Calendar 2.36.11918
        
        Also all old versions of the programs listed above (downloaded before
        the 5th of November 2011) can be fixed by updating the MiniSMTP.exe 
        component to version 3.0 (from v1.3x). This download can be found here:
        
          - http://ftp.njstar.com/sw/njsmtp30rel11918.exe
        
        NJStar has also changed the SMTP server configuration to only listen
        on localhost.
        
        More information is available on the NJStar website [3], and NJStar plans
        to contact all registered customers shortly.


REFERENCES

        [1] NJStar Communicator MiniSmtp packet processing buffer overflow
            vulnerability
            http://www.kb.cert.org/vuls/id/819630

        [2] Researcher Warns Of Exploitable Hole In Chinese Translation
            Software NJStar
            http://threatpost.com/en_us/blogs/researcher-warns-exploitable-hole-chinese-translation-software-njstar-110111

        [3] NJStar Security Information
            http://www.njstar.com/cms/njstar-security-information

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=APoh
-----END PGP SIGNATURE-----