Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Magic Enterprise Edition Vendors:   Magic Software Enterprises Ltd.
Magic Enterprise Edition Application Environment Lets Local Users Obtain Root Privileges and May Give Remote Users Access to the System
SecurityTracker Alert ID:  1003013
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 19 2001
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, Root access via local system, User access via network
Exploit Included:  Yes  
Version(s): 8.30-5 and prior, 9.x not fully tested
Description:   Multiple vulnerabilities were reported by immutec in the Magic Enterprise Edition application environment. Remote users may be able to obtain operating system access on the server and local users can obtain root privileges on the server.

Several security holes were reported.

A remote buffer overflow reportedly exists in the 'mgrqcgi' cgi script, which reads variables from the QUERY_STRING environment variable that is set by the web server and then copies them with regards to the length of the variable. It may be possible for a remote user to exploit this to cause arbitrary code to be executed with the privileges of the Magic server, however, certain codes cannot be used in the overflow, which may restrict the exploitability. The ability to exploit this has not been confirmed.

In the Linux installation, a local user can exploit a buffer overflow in the set user id (suid) root application /usr/magicadm/servers/mgdispatch to cause arbitrary code to be executed with root privileges. There are reported to be buffer overflows in this code, including the lack of bounds checking while reading the MGDISPATCH_LOG environment variable.

The Magic server reportedly makes unsafe use of temporary files in the Linux installation (and possibly others), allowing a local user to create symlinks from temporary files to other critical files, causing them to be created, modified, or overwritten.

The Magic server reportedly installs some files and directories with group writeable permissions for the 'users' group, including the Magic Admin home directory /usr/magicadm which includes the license directory and various executables. A local user can replace some executables with trojans or can cause arbitrary code to be executed with the privileges of the Magic administrator.

The author reports that there may likely be other vulnerabilities in the product.

Impact:   A remote user may be able to execute arbitrary code on the server with the privileges of the Magic server, giving that user access to the system. A local user can execute arbitrary shell commands with root privileges and otherwise cause arbitrary code to be executed by the Magic administrator to obtain elevated privileges on the system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Open UNIX-SCO), UNIX (Tru64), Windows (NT)

Message History:   None.

 Source Message Contents

Subject:  [VulnWatch] MAGIC Enterprise Multiple Vulnerabilities

Content-Type: text/plain;
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;

Hash: SHA1

immutec Security Advisory
ID:       SA-MAGIC-001
Date:     2001/12/17
Version:  0.2

Magic Enterprise multiple vulnerabilities

Affected Software/System:

  Vendor    : Magic Software (
  Product   : Magic Enterprise Edition
  Version   : 8.30-5 and prior, 9.x not fully tested
  Platform  : Solaris, Linux, AIX, HP/UX, SCO, Digital Unix, AS/400, NT

Vulnerability Types:

  Memory Corruption       : remote/local
  Shell Command Execution : local
  Temporary File Handling : local
  Insecure Permissions    : local (filesystem)

Product Description:

  The Magic Enterprise Edition Version 8 is a multi-platform, flexible
  application which supports well known web browsers, web servers,
  application servers and databases. Magic v8 gives a developer the 
  ability to create portable and scalable client-/server-based or 
  web-based applications.

  Magic is used by important eCommerce sites, payment systems, banks, big
  automobile companies and even on government servers.

Vulnerability Description:

  Serveral security holes were found in Magic Enterprise Edition Version 8
  (Solaris) while doing a penetration test for a customer.
  In depth analysis was performed for the Linux version. Version 9 was not
  fully tested, but at least some issues were also verified for Version 9.

  a.)  Memory Corruption: remote

  The CGI executable 'mgrqcgi' is used as a kind of gateway to handle 
  different tasks.
  mgrqcgi reads different variables from the QUERY_STRING environment
  variable, which is set by the HTTP server.
  The names of the variables:

    + PageID
    + mgaction
    + H_ShopID
    + H_SID
    + H_WID
    + H_INF
    + and much more

  The variable data is copied into local variables using the non-bound
  checking library function strcpy(3).
  This can be easily verified by triggering the overflow using a standart 
  web browser. Overwriting the memory for APPNAME bytewise results in 
  overwriting PRGNAME input until an internal server error occurs.

  Attached ltrace output (comments included in []):

    17:00:03.769509 [08049794] getenv("REQUEST_METHOD") = "GET"
    17:00:03.769680 [080497ae] strcmp("GET", "POST")  = -9
    17:00:03.769817 [080497ce] strcmp("GET", "GET")   = 0

    [QUERY_STRING read and splitted up]

    17:00:03.769942 [08049915] getenv("QUERY_STRING") =
    17:00:03.770687 [08049b81] strchr("APPNAME=test&PRGNAME=AAAAAAAAAAAAA
    17:00:03.772443 [08049bb7] strchr("test&PRGNAME=AAAAAAAAAAAAAAAAAAAAA
    17:00:03.773713 [08049df3] malloc(8)              = 0x08077458
    17:00:03.773811 [08049d30] realloc(NULL, 8)       = 0x08077468
    17:00:03.773929 [08049df3] malloc(6)              = 0x08077478

    [variable name seperated from variable data]

    17:00:03.774025 [08049b81] strchr("PRGNAME=AAAAAAAAAAAAAAAAAAAAAAAAAA
    17:00:03.776353 [08049bb7] strchr("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    '&') = NULL
    17:00:03.777015 [08049bf0] strlen(0xbffffa2a, 0x080498f8, 0x40014ce4,
    0x08077458, 0x080613d8) = 200
    17:00:03.777157 [08049df3] malloc(8)              = 0x08077488
    17:00:03.777253 [08049d30] realloc(0x08077468, 16) = 0x08077498
    17:00:03.777974 [08049df3] malloc(202)            = 0x080774b0
    17:00:03.778077 [0804acdf] malloc(32)             = 0x08077580
    17:00:03.778191 [0804acf4] memset(0x08077580, '\000', 32) = 0x08077580

    [variable name made upper case]

    17:00:03.778302 [0804dcec] toupper('A')           = 'A'
    17:00:03.778413 [0804dcfd] toupper('C')           = 'C'
    17:00:03.778521 [0804dd1c] toupper('A')           = 'A'
    17:00:03.778785 [0804dd2d] toupper('C')           = 'C'
    17:00:03.778892 [0804dcec] toupper('A')           = 'A'
    17:00:03.778999 [0804dcfd] toupper('A')           = 'A'
    17:00:03.779107 [0804dcec] toupper('P')           = 'P'
    17:00:03.779213 [0804dcfd] toupper('P')           = 'P'
    17:00:03.779320 [0804dcec] toupper('P')           = 'P'
    17:00:03.779427 [0804dcfd] toupper('P')           = 'P'
    17:00:03.779534 [0804dcec] toupper('N')           = 'N'
    17:00:03.779641 [0804dcfd] toupper('N')           = 'N'
    17:00:03.779748 [0804dcec] toupper('A')           = 'A'
    17:00:03.779854 [0804dcfd] toupper('A')           = 'A'
    17:00:03.779962 [0804dcec] toupper('M')           = 'M'
    17:00:03.780068 [0804dcfd] toupper('M')           = 'M'
    17:00:03.780175 [0804dcec] toupper('E')           = 'E'
    17:00:03.780300 [0804dcfd] toupper('E')           = 'E'
    17:00:03.780408 [0804dd1c] toupper('\000')        = '\000'
    17:00:03.780517 [0804dd2d] toupper('\000')        = '\000'

    [APPNAME content copied into stack memory WITHOUT length checking]

    17:00:03.780626 [0804ae56] strcpy(0xbfffee68, "test") = 0xbfffee68

    [variable name to upper case]

    17:00:03.835647 [0804dcec] toupper('P')           = 'P'
    17:00:03.835828 [0804dcfd] toupper('C')           = 'C'
    17:00:03.835936 [0804dd1c] toupper('P')           = 'P'
    17:00:03.836043 [0804dd2d] toupper('C')           = 'C'
    17:00:03.836150 [0804dcec] toupper('P')           = 'P'
    17:00:03.836257 [0804dcfd] toupper('P')           = 'P'
    17:00:03.836364 [0804dcec] toupper('R')           = 'R'
    17:00:03.836471 [0804dcfd] toupper('R')           = 'R'
    17:00:03.836577 [0804dcec] toupper('G')           = 'G'
    17:00:03.836684 [0804dcfd] toupper('G')           = 'G'
    17:00:03.837645 [0804dcec] toupper('N')           = 'N'
    17:00:03.837766 [0804dcfd] toupper('N')           = 'N'
    17:00:03.837873 [0804dcec] toupper('A')           = 'A'
    17:00:03.837980 [0804dcfd] toupper('A')           = 'A'
    17:00:03.838103 [0804dcec] toupper('M')           = 'M'
    17:00:03.838210 [0804dcfd] toupper('M')           = 'M'
    17:00:03.838317 [0804dcec] toupper('E')           = 'E'
    17:00:03.838423 [0804dcfd] toupper('E')           = 'E'
    17:00:03.838530 [0804dd1c] toupper('\000')        = '\000'
    17:00:03.838639 [0804dd2d] toupper('\000')        = '\000'

    [PRGNAME content copied into stack memory WITHOUT length checking]
    [BUFFER OVERFLOW triggered here]

    17:00:03.838748 [0804ae70] strcpy(0xbfffee48,
    = 0xbfffee48

    [segmentation fault occuring]

    17:00:03.839409 [080497f5] getenv("HTTP_COOKIE")  = NULL
    17:00:03.839545 [08049ac0] getenv("REMOTE_ADDR")  = NULL
    17:00:03.839687 [0805aff4] memset(0x08076e68, '\000', 120) = 
    17:00:03.839801 [08053971] strcpy(0x08077334, "otaku") = 0x08077334
    17:00:03.839920 [0804cdb7] malloc(1508)           = 0x080775a8
    17:00:03.840018 [0804cad0] memcpy(0x080775b0, "\001\001", 1500) =
    17:00:03.840160 [08052f00] strlen(0xbfffedc8, 0x08049ab4, 0xbfffee00,
    0xbfffedc8, 0x080775b0) = 0
    17:00:03.840308 [08052f5b] strlen(0xbfffed48, 0x08049ab4, 0xbfffee00,
    0xbfffed48, 0x080775b0) = 0
    17:00:03.840440 [080519d5] memcpy(0x08076e60, "\001\001", 1500) =
    17:00:03.840577 [0804cef0] free(0x080775a8)       = <void>
    17:00:03.840672 [0804b52c] memset(0xbfffeef8, '\000', 16) = 0xbfffeef8
    17:00:03.840782 [0804b54c] malloc(200)            = 0x080775a8
    17:00:03.841364 [0804afe6] --- SIGSEGV (Segmentation fault) ---
    17:00:03.841890 [ffffffff] +++ killed by SIGSEGV +++

  The GNU Debugger output:

    Starting program: /usr/local/httpd/cgi-bin/mgrqcgi
    (no debugging symbols found)...(no debugging symbols found)...(no
    debugging symbols found)...
    (no debugging symbols found)...
    Program received signal SIGSEGV, Segmentation fault.
    0x0804b103 in strcpy ()
    (gdb) info stack
    #0  0x0804b103 in strcpy ()
    #1  0x41414141 in ?? ()
    #2  0x0804a440 in strcpy ()
    #3  0x08049b18 in strcpy ()
    #4  0x41414141 in ?? ()

  Some characters could not be used while overflowing the internal
  buffers, because they have other meanings in the CGI context or are 
  Characters that could not be used:

    + 0x00
    + 0x09
    + 0x0A
    + 0x0B
    + 0x0C
    + 0x0D
    + 0x20
    + 0x23
    + 0x25
    + 0x26

  b.) Memory Corruption: local

  The Linux RPM comes with one setuid root application:

    + /usr/magicadm/servers/mgdispatch

  There seem to be serveral buffer overflows in the code of mgdispatch.
  One example of missing bounds checking occurs very early in the program
  code while reading an environment variable called MGDISPATCH_LOG.
  The destination buffer is about 3000 bytes big, so an attacker has 
  enough space for stuffing the shellcode in and execute arbitrary 

  ltrace output:

    getenv("MGDISPATCH_LOG")                          =
    strcpy(0xbfffd87c, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"...) = 
    getenv("MG_DOS_CLIENTS" <unfinished ...>
    --- SIGSEGV (Segmentation fault) ---
    +++ killed by SIGSEGV +++

  The GNU Debugger output::
    (gdb) r 78
    Starting program: ./mgdispatch 78
    (no debugging symbols found)...(no debugging symbols found)...
    (no debugging symbols found)...(no debugging symbols found)...
    Program received signal SIGSEGV, Segmentation fault.
    0x4008d63b in getenv () from /lib/
    (gdb) bt
    #0  0x4008d63b in getenv () from /lib/
    #1  0x0804dec8 in strcpy ()
    #2  0x41414141 in ?? ()

  c.) Temporary File Handling

  Some shell script files included in the Linux RPM (probably applies
  to other versions as well) do insecure temporary file handling, 
  allowing symlink attacks, replacing information and execution 
  of commands.

  This list includes shell script names and the appropriate lines:

    + /usr/magicadm/api/mkuserproc:40:tmpfile=/tmp/mg.$$
    + /usr/magicadm/sbin/mgrnt:42:$AWK -F= '/^[^#]/ {if (NF > 0) print
                                  "export " $1}' $MAGIC_HOME/etc/mgenv >
    + /usr/magicadm/sbin/mgrnt:43:. /tmp/mg$$
    + /usr/magicadm/sbin/mgrnt:44:rm -f /tmp/mg$$
    + /usr/magicadm/sbin/mgrnt:63:$AWK -F= '/^[^#]/ {if (NF > 0)
                                  print "export " $1}' $EnvUserFile > 
    + /usr/magicadm/sbin/mgrnt:64:. /tmp/mgu$$
    + /usr/magicadm/sbin/mgrnt:65:rm /tmp/mgu$$
    + /usr/magicadm/servers/$AWK -F= '/^[^#]/ {if (NF >
                                             0) print "export " $1}' 
                                             $MAGIC_HOME/etc/mgenv > 
    + /usr/magicadm/servers/ /tmp/mg$$
    + /usr/magicadm/servers/ -f /tmp/mg$$
    + /usr/magicadm/servers/$AWK -F= '/^[^#]/
                                             {if (NF > 0) print "export 
                                             " $1}' $EnvUserFile > 
    + /usr/magicadm/servers/ /tmp/mgu$$
    + /usr/magicadm/servers/ /tmp/mgu$$

  d.) Insecure Permissions
  The RPM file installs some files and directories group 'users' 
  This includes the Magic Admin home directory /usr/magicadm (a magicadm
  account is created in /etc/passwd), the license directory and various
  The list of group writeable executables:
    + /usr/magicadm/bin/magicrnt
    + /usr/magicadm/bin/mdinformix
    + /usr/magicadm/bin/mdmssql
    + /usr/magicadm/bin/mdoracle
    + /usr/magicadm/bin/mgcircvr
    + /usr/magicadm/bin/mgcisam
    + /usr/magicadm/bin/mginformix
    + /usr/magicadm/bin/mgmemory
    + /usr/magicadm/bin/mgoracle
    + /usr/magicadm/bin/mgtcp
    + /usr/magicadm/broker/mgrqcmdl
    + /usr/magicadm/broker/mgrqmrb
    + /usr/magicadm/cgibin/mgrqcgi
    + /usr/magicadm/servers/mgdatasrvr

  This allows an attacker to replace these writeable executeables to gain
  higher privileges and even any other file to exploit trusted 

  e.) Miscellaneous
  The symbols that are exported by the executables and by the
  Magic-Request API library reveal, that there are even more insecure C-
  library functions like system(3), strcpy(3), strcat(3) and sprintf(3)
  and alike.

Vendor Response:

  Vendor contacted at 11.12.2001 according to 'Full Disclosure Policy 2.0',
  however we got no appropriate response.


  none yet


  immutec GmbH
  Mendelstr. 11
  48149 Muenster
  Phone: ++49 (0) 251/980-1230
  Fax:   ++49 (0) 251/980-1231


  Thomas Biege <>
  Stephan Holtwisch <>


 This advisory does not claim to be complete or to be usable for any 
 purpose. Especially information on the vulnerable systems may be
 inaccurate or wrong. Possible supplied exploit code is not to be used
 for malicious purposes, but for educational purposes only.

 Copyright (c) 2001, immutec GmbH

 Redistribution without modification is permitted.
 Redistribution with modification is permitted if the copyright notice,
 disclaimer and authors notice are retained.

Version: GnuPG v1.0.6 (IRIX64)
Comment: For info see




Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC